ICAT4221B Locate equipment, system and software faults
1: Rectify fault and testThis unit will show you about rectifying faults, testing for the success of the solution and perform acceptance testing of the system to ensure the problem has been satisfactorily solved.Outcomes for this unit After completing this learning pack you will be able to.Rectify possible causes, testing for the success of the solution.Test the system to ensure the problem has been solvedActivity 1.1: Action Plan This activity will require you to prepare an action plan for a given fault. The fault is described below. You will need to formulate this plan in fairly generic terms since you would be working without having had exposure to the system described.The faultYou have been assigned to troubleshoot a network server. The server has been operational for over 18 months and has recently started to experience some problems. The symptoms described are as follows: .System hangs intermittently when accessing disk drives.The Windows 2000 Event Log shows several entries relating to I/O and CRC errors.The lights in front of the RAID enclosure sometimes blink continuously, even when .disk activity is nonexisten..You suspect that the RAID subsystem is failingQ: How would you develop an action plan, which will enable you get to the bottom of this problem?A: An appropriate action plan would incorporate the following characteristics\.Identifies the systems or components affected or impacted.Identify the objectives of the plan (i.e. restore optimum functionality).Identifies resources needed, including hardware, software, human, procedures.Identify severity and criticality, hence priority.Identifies a timeframe for implementation, according to priority.Identifies any support contracts that might exist and be applicable to system in question.Indicates actual remedial steps to be taken. This might include system .reconfiguration, re-installation, software patches, component replacement, consultation with vendors to engage as needed.Indicate risks including expected disruption as result of remedial action.Identify a workaround solution in case previous steps failed to provide to rectify fault Note: that not all items in the list from above should be included, but they should at least be considered. An appropriate way for developing this action plan would to use a pre-existing form, available as an organisational document. Note: that quite often, highly featured help desk software would include all of the above items as part of the standard description of faults and their management.Activity 1.2: Rollback strategyThis activity will require you to devise a rollback strategy based on the scenario from the previous activity. The fault is described below.The fault.You have been assigned to troubleshoot a network server. The server has been operational for over 18 months and has recently started to experience some problems..The symptoms described are as follows:.System hangs intermittently when accessing disk drives.The Windows 2000 Event Log shows several entries relating to I/O and CRC errors.The lights in front of the RAID enclosure sometimes blink continuously, even whendisk activity is nonexistentYou suspect that the RAID subsystem is failing.Q: How would you develop a rollback strategy for this situation?A: A rollback strategy is a series of steps or measures that would enable you to restore the system being troubleshot to the state prior to troubleshooting beginning.In this particular case, you rollback strategies would have considered the following:.Steps from action plan may be reversed or equivalent system status can be achieved with alternative steps.No data loss will be incurred. Full system and data backups are to be made before enacting the action plan.Spare components are available, if needed.Expertise is available for system reconfiguration. This might include internal .personnel and external (vendors or contractors).An alternative solution is available. ie backup server.The consequences and impact of the rollback are understoodActivity 1.3: Acceptance TestingThis activity will require you to devise an acceptance test procedure based on the scenario from the previous activity. The fault is described below.The faultYou have been assigned to troubleshoot a network server. The server has been operational for over 18 months and has recently started to experience some problems.The symptoms described are as follows:.System hangs intermittently when accessing disk drives.The Windows 2000 Event Log shows several entries relating to I/O and CRC errors,.The lights in front of the RAID enclosure sometimes blink continuously, even when disk activity is nonexistent.You suspect that the RAID subsystem is failing.Q: How would you develop an acceptance test procedure?A: The development of an Acceptance Test involves a number of iterative steps: 1.Assess the type of testing required2.Develop the procedures and instructions for testing 3.Develop the necessary test scripts4.Execute the test scripts 5.Report any defects 6.Retest any fixesYour acceptance test procedure might have included some of the following items:1.Test type to be carried out ie simple, iterative, sequential2.Instructions to be carried out ie any necessary preparations such as installation of monitoring software, auditing, load testing, benchmarking3.The sequence (order) of tests to be done4.Resulting data that will be analysed following the execution of tests ie reports, charts, benchmarking results, system log events5.Definitions of what constitutes failure. Criteria or metrics to be stipulated here ie repetition of original symptoms, new symptoms6.Repetition of testing after new fixes actioned2: Obtain appropriate fault-finding toolsFault-finding is a crucial skill in the life of the IT professional, no matter what area of IT you are in. Fault finding can be very challenging indeed, yet being able to solve a difficult problem can bring enormous satisfaction and recognition. The good news is that fault-finding skills can be developed. Fault-finding is a skill that will accompany you throughout your professional career. The aim of this unit is to allow you to develop an understanding for fault-finding tools and methods. You will have an opportunity to practise using fault-finding tools and methods to solve real problems. In this topic, you will have an opportunity to learn about tools that are used for fault-finding and troubleshooting purposes. You will also learn about generic cyclic fault-finding methods. Additionally, you will have an opportunity to practise fault-finding using commonly available tools for a range of computer systems, both standalone and networked.Outcomes for this unitAfter completing this learning pack you will be able to:.Analyse and document the system that requires troubleshooting .Research specifically designed troubleshooting tools for the system .Investigate generic cyclic fault finding tools .Obtain required specialist toolsThis activity will require you to use the Internet to search for fault-finding tools that might be appropriate for an IT environment.Use the following as search criteria:. One software-based tool that performs standalone PC diagnostics. This tool must be freeware/open source/GNU GPL. . One software-based tool that performs standalone PC diagnostics. This tool must be commercial. .One software based tool that performs network diagnostics, for example, network discovery, packet capture and analysis. This tool must be freeware/open source/GNU GPL. . One software based tool that performs network diagnostics, for example, network discovery, packet capture and analysis. This tool must be commercialQ: What fault finding tools did you find that might be appropriate for an IT environment?A: There are literally hundreds of software-based tools available. The real challenge is to be able to sort through them all and find the ones that will enhance your ability to find problems and fix them. Some possible answers are listed below:.Sandra, .Systemworks, .Ethereal, .Fluke Network Inspector, and .Protocol Inspector. .Activity 2.2: Hardware toolsThe aim of this activity is for you to find out about hardware based tools that can assist you in the troubleshooting process. You will use the Internet, trade magazines and books to find out about hardware tools. Use the following criteria to narrow down your search.You need to find:
Sunday, October 18, 2009
ICAS4022B Determine and action client computing problems
ICAS4108B Complete database back-up and recovery
Database Backup and RecoveryMost of database systems have incorporated backup and recovery tools into their interfaces and infrastructure it is a good idea to understand what the backup and recovery process involves, beyond the work flow of using the tools. With the growing dependency in the workplace on information and general, and the information in your database specifically, there has never been a time when safe backups and reliable recoveries were more important. Are you maintaining your databases properly? Do they participate in a backup and recovery routine that checks on the health of the data? If you are not 100% sure of this, then you need to find out.Database Backup and Recovery NeedsIt is not just the data files that need to be part of the backup process. You must also backup the transaction logs of the database as well. Without the transaction logs the data files are useless in a recovery event. How often you choose to perform these backup routines is really dependent on the data requirements of your company. If you do not know what those are then you need to find out either by referring to them or asking for them to be created through a research and investigation process.Backup and Recovery and Database FailureFailure can happen for any number of reasons. There are three main ones that recur enough to be worth incorporating into your backup and recovery plan. User error is the number one reason for data damage, loss, or corruption. Included in this type of failure is an application modifying or destroying the data on its own or through a user choice. Recovery and restore to the point in time before the corruption occurred.This returns the data to a clean position at the cost of any other changes that were being made to the data since the point the corruption took place. Any lost work will need to be re-entered or processes repeated if necessary.Media failure can also cause data loss or damage. Media failure can happen when the media the data files or transaction logs are stored on fail. Most databases will be stored on computer hard drives or across groups of hard drives on designated servers. Hard drives are mechanical devices, just like automobiles, and are made up of parts and pieces that work together. Mechanical devices are known for failure and will need to be replaced once, or if, the data has been retrieved from them.Backup and Recovery and DisasterThe third reason for database failure is a disastrous or catastrophic event. This can be in the form of fire, flood, or any naturally occurring storm. It can also happen through electrical outage, a virus, or the deliberate hacking of your data. Any of these can corrupt or cause the loss of your data. The true disaster will be the lack of data backup and or the lack of a recovery plan. Without data backup recovery is impossible. And without a recovery plan there is no guarantee that your data backup will make it through the recovery process.This chapter assumes that some or all of your datafiles are lost or damaged. Typically, this situation is caused by a media failure or accidental deletion. Your goal is to return the database to normal operation by restoring the damaged files from RMAN backups and recovering all database changes.Scope of This ChapterThis chapter explain how to use complete recovery to fix the most common database problems. This chapter makes the following assumptions:You have lost some or all datafiles and your goal is to recover all changes, but you have not lost all current control files or an entire online redo log group..Your database is using the current server parameter file..You have the complete set of archived redo logs and incremental backups needed for recovery of your datafile backups. Every datafile either has a backup, or a complete set of online and archived redo logs goes back to the creation of a datafile with no backup..RMAN can handle lost datafiles without user intervention during restore and recovery. When a datafile is lost, the possible cases can be classified as follows:oThe control file knows about the datafile, that is, you backed up the control file after datafile creation, but the datafile itself is not backed up. If the datafile record is in the control file, then RESTORE creates the datafile in the original location or in a user-specified location. The RECOVER command can then apply the necessary logs to the datafile.oThe control file does not have the datafile record, that is, you did not back up the control file after datafile creation. During recovery, the database will detect the missing datafile and report it to RMAN, which will create a new datafile and continue recovery by applying the remaining logs. If the datafile was created in a parent incarnation, then it will be created during the restore or recovery phase as appropriate..You are not restoring and recovering an encrypted tablespace.If you perform media recovery on an encrypted tablespace, then the Oracle wallet must be open when performing media recovery of this tablespace. See Oracle Database Administrator's Guide to learn about encrypted tablespaces..You are using the RMAN client rather than Oracle Enterprise Manager.Enterprise Manager provides access to RMAN through a set of wizards. These wizards lead you through a variety of recovery procedures based on an analysis of your database, your available backups, and your data recovery objectives.By using Enterprise Manager, you can perform the simpler restore and recovery scenarios outlined in this chapter. You can also use more sophisticated restore and recovery techniques such as point-in-time recovery and database flashback, which allow for efficient repair of media failures and user errors. In most cases, using Enterprise Manager is simpler than using the RMAN command-line client directlyPreparing for Complete Database RecoveryWhile RMAN simplifies most database restore and recovery tasks, you must still plan your database restore and recovery strategy based on which database files have been lost and your recovery goal. This section contains the following topics:.Identifying the Database Files to Restore or Recover.Determining the DBID of the Database.Previewing Backups Used in Restore Operations.Validating Backups Before Restoring Them.Restoring Archived Redo Logs Needed for RecoveryIdentifying the Database Files to Restore or RecoverThe techniques for determining which files require restore or recovery depend upon the type of file that is lost.It is usually obvious when the control file of your database is lost. The database shuts down immediately when any of the multiplexed control files becomes inaccessible. Also, the database reports an error if you try to start it without a valid control file at each location specified in the CONTROL_FILES initialization parameter.Loss of some but not all copies of your control file does not require you to restore a control file from backup. If at least one control file remains intact, then you can either copy an intact copy of the control file over the damaged or missing control file, or update the initialization parameter file so that it does not refer to the damaged or missing control file. After the CONTROL_FILES parameter references only present, intact copies of the control file, you can restart your database.If you restore the control file from backup, then you must perform media recovery of the whole database and then open it with the OPEN RESETLOGS option, even if no datafiles need to be restored. This technique is described in "Performing Recovery with a Backup Control File".Identifying Datafiles Requiring Media RecoveryWhen and how to recover depends on the state of the database and the location of its datafiles.Identifying Datafiles with RMANAn easy technique for determining which datafiles are missing is to run a VALIDATE DATABASE command, which attempts to read all specified datafiles. For example, start the RMAN client and run the following commands to validate the database (sample output included).Example 17-1 BACKUP VALIDATE DATABASERMAN> VALIDATE DATABASE;Starting validate at 20-OCT-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=90 device type=DISKcould not read file header for datafile 7 error reason 4RMAN-00571: ===========================================================RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============RMAN-00571: ===========================================================RMAN-03002: failure of backup command at 10/20/2007 13:05:43RMAN-06056: could not access datafile 7The output in Example 17-1 indicates that datafile 7 is inaccessible. You can then run the REPORT SCHEMA command to obtain the tablespace name and filename for datafile 7 as follows (sample output included):RMAN> REPORT SCHEMA;Report of database schemafor database with db_unique_nameRDBMSList of Permanent Datafiles===========================File Size(MB) Tablespace RB segs DatafileName---- -------- -------------------- ------- ------------------------1 450 SYSTEM *** +DATAFILE/tbs_01.f2 86 SYSAUX *** +DATAFILE/tbs_ax1.f3 15 UD1 *** +DATAFILE/tbs_undo1.f4 2 SYSTEM *** +DATAFILE/tbs_02.f5 2 TBS_1 *** +DATAFILE/tbs_11.f6 2 TBS_1 *** +DATAFILE/tbs_12.f7 2 TBS_2 *** +DATAFILE/tbs_21.fList of Temporary Files=======================File Size(MB) Tablespace Maxsize(MB) TempfileName---- -------- -------------------- ----------- --------------------1 40 TEMP 32767 +DATAFILE/tbs_tmp1.fAlthough VALIDATE DATABASE is a good technique for determining whether files are inaccessible, you may want to use SQL queries to obtain more detailed information.To determine whether datafiles require media recovery:1-Start SQL*Plus and connect to the target database instance. For example, issue the following commands to connect to trgt:sqlplusSQL> CONNECT SYS/password@trgt AS SYSDBA2-Determine the status of the database by executing the following SQL query:3-SELECT STATUS FROM V$INSTANCE;If the status is OPEN, then the database is open. Nevertheless, some datafiles may require media recovery.Query V$DATAFILE_HEADER to determine the status of your datafiles. Run the following SQL statements to check the datafile headers:COL FILE# FORMAT 999COL STATUS FORMAT A7COL ERROR FORMAT A10COL TABLESPACE_NAME FORMAT A10COL NAME FORMAT A30SELECT FILE#, STATUS, ERROR, RECOVER, TABLESPACE_NAME, NAMEFROM V$DATAFILE_HEADERWHERE RECOVER = 'YES'OR (RECOVER IS NULL AND ERROR IS NOT NULL);Each row returned represents a datafile that either requires media recovery or has an error requiring a restore. Check the RECOVER and ERROR columns. RECOVER indicates whether a file needs media recovery, and ERROR indicates whether there was an error reading and validating the datafile header.If ERROR is not NULL, then the datafile header cannot be read and validated. Check for a temporary hardware or operating system problem causing the error. If there is no such problem, you must restore the file or switch to a copy.If the ERROR column is NULL and the RECOVER column is YES, then the file requires media recovery (and may also require a restore from backup).Note:Because V$DATAFILE_HEADER only reads the header block of each datafile, it does not detect all problems that require the datafile to be restored. For example, this view cannot tell whether a datafile contains corrupt data blocks.4-Optionally, query V$RECOVER_FILE to list datafiles requiring recovery by datafile number with their status and error information. For example, execute the following querySELECT FILE#, ERROR, ONLINE_STATUS, CHANGE#, TIMEFROM V$RECOVER_FILE;Note:You cannot use V$RECOVER_FILE with a control file restored from backup or a control file that was re-created after the time of the media failure affecting the datafiles. A restored or re-created control file does not contain the information needed to update V$RECOVER_FILE accurately.To find datafile and tablespace names, you can also perform useful joins using the datafile number and the V$DATAFILE and V$TABLESPACE views. For example:COL DF# FORMAT 999COL DF_NAME FORMAT A35COL TBSP_NAME FORMAT A7COL STATUS FORMAT A7COL ERROR FORMAT A10COL CHANGE# FORMAT 99999999SELECT r.FILE# AS df#, d.NAME AS df_name,t.NAME AS tbsp_name, d.STATUS, r.ERROR, r.CHANGE#,r.TIMEFROM V$RECOVER_FILE r, V$DATAFILE d, V$TABLESPACE tWHERE t.TS# = d.TS#AND d.FILE# = r.FILE#;The ERROR column identifies the problem for each file requiring recovery.Determining the DBID of the DatabaseIn situations requiring the recovery of your server parameter file or control file from autobackup, you need to know the DBID. You should record the DBID along with other basic information about your database..If you do not have a record of the DBID of your database, then you can find it in the following places without opening your database:.The DBID is used in forming the filename for the control file autobackup. Locate this file, and then refer to "Configuring the Control File Autobackup Format" to determine where the DBID appears in the filename..If you have any text files that preserve the output from an RMAN session, then the DBID is displayed by the RMAN client when it starts up and connects to your database. Typical output follows:.% rman TARGET /Recovery Manager: Release 11.1.0.6.0 - Production on Wed Jul 11 17:51:30 2007Copyright (c) 1982, 2007, Oracle. All rights reserved.connected to target database: PROD (DBID=36508508Previewing Backupa Used in Restore OperationsYou can apply RESTORE ... PREVIEW to any RESTORE operation to create a detailed list of every backup to be used in the requested RESTORE operation, as well as the necessary target SCN for recovery after the RESTORE operation is complete. This command accesses the RMAN repository to query the backup metadata, but does not actually read the backup files to ensure that they can be restored.As an alternative to RESTORE ... PREVIEW, you can use the RESTORE ... VALIDATE HEADER command. In addition to listing the files needed for restore and recovery, the RESTORE ... VALIDATE HEADER command validates the backup file headers to determine whether the files on disk or in the media management catalog correspond to the metadata in the RMAN repository.When planning your restore and recovery operation, use RESTORE ... PREVIEW or RESTORE ... VALIDATE HEADER to ensure that all required backups are available or to identify situations in which you may want to direct RMAN to use or avoid specific backups.To preview backups to be used in a restore operation1-Run a RESTORE command with the PREVIEW option.For example, run one of the following commands:RESTORE DATABASE PREVIEW;RESTORE ARCHIVELOG FROM TIME 'SYSDATE-7' PREVIEW;If the report produced by RESTORE ... PREVIEW provides too much information, then specify the SUMMARY option as shown in the following example:RESTORE DATABASE PREVIEW SUMMARY;If satisfied with the output, then stop here. If the output indicates that RMAN will request a backup from a tape that you know is temporarily unavailable, then continue with this procedure. If the output indicates that a backup is stored offsite, then skip to "Recalling Offsite Backups".2-If needed, use the CHANGE command to set the backup status of any temporarily unavailable backups to UNAVAILABLE."Updating a Backup to Status AVAILABLE or UNAVAILABLE" explains how to perform this task.3-Optionally, run RESTORE ... PREVIEW again to confirm that the restore will not attempt to use unavailable backups.Recalling Offsite BackupsSome media managers provide status information to RMAN about which backups are offsite. An offsite backup is stored in a remote location, such as a secure storage facility, and cannot be restored unless the media manager retrieves the media.Offsite backups are marked as AVAILABLE in the RMAN repository even though the media must be retrieved from storage before the backup can be restored. If RMAN attempts to restore a offsite backup, then the restore job fails.You can use RESTORE ... PREVIEW to identify offsite backups. The command output indicates whether backups are stored offsite, as shown by the text at the end of the sample output in Example 17-2.List of Backup Sets===================BS Key Size Device Type Elapsed Time Completion Time------- ---------- ----------- ------------ ---------------9 2.25M SBT_TAPE 00:00:00 21-MAY-07 BP Key: 9 Status: AVAILABLE Compressed: NO Tag: TAG20070521T144258 Handle: 0aii9k7i_1_1 Media: 0aii9k7i_1_1 List of Archived Logs in backup set 9 Thrd Seq Low SCN Low Time Next SCN Next Time ---- ------- ---------- --------- ---------- ---------1 1 392314 21-MAY-07 392541 21-MAY-07 1 2 392541 21-MAY-07 392545 21-MAY-07 1 3 392545 21-MAY-07 392548 21-MAY-07 1 4 392548 21-MAY-07 395066 21-MAY-07 1 5 395066 21-MAY-07 395095 21-MAY-07 1 6 395095 21-MAY-07 395355 21-MAY-07List of remote backup files============================Handle: aii9k7i_1_1 Media: 0aii9k7i_1_1validation succeeded for backup pieceFinished restore at 21-MAY-07released channel: dev1You can use RESTORE ... PREVIEW RECALL to instruct the media manager to make offsite backups available.To recall offsite backups:1-If backups are stored offsite, then execute a RESTORE ... PREVIEW command with the RECALL option.The following example initiates recall for the offsite archived log backups shown in Example 17-2 (sample output included):RESTORE ARCHIVELOG ALL PREVIEW RECALL;The following sample output indicates that RMAN initiated a recall:List of Backup Sets===================BS Key Size Device Type Elapsed Time Completion Time------- ---------- ----------- ------------ ---------------9 2.25M SBT_TAPE 00:00:00 21-MAY-07 BP Key: 9 Status: AVAILABLE Compressed: NO Tag: TAG20070521T144258 Handle: VAULT0aii9k7i_1_1 Media: /tmp,VAULT0aii9k7i_1_1 List of Archived Logs in backup set 9 Thrd Seq Low SCN Low Time Next SCN Next Time---- ------- ---------- --------- ---------- --------- 1 1 392314 21-MAY-07 392541 21-MAY-07 1 2 392541 21-MAY-07 392545 21-MAY-07 1 3 392545 21-MAY-07 392548 21-MAY-07 1 4 392548 21-MAY-07 395066 21-MAY-07 1 5 395066 21-MAY-07 395095 21-MAY-07 1 6 395095 21-MAY-07 395355 21-MAY-07Initiated recall for the following list of remote backup files==========================================================Handle: VAULT0aii9k7i_1_1 Media: /tmp,VAULT0aii9k7i_1_1validation succeeded for backup pieceFinished restore at 21-MAY-07released channel: dev12-Run the RESTORE ... PREVIEW command. If necessary, return to the previous step until no backups needed for the restore are reported as offsite.Validating Backups Before Restoring ThemWhile the procedures in "Previewing Backups Used in Restore Operations" indicate which backups will be restored, they do not verify that the backups are actually usable. You can run RMAN commands to test the availability of usable backups for any RESTORE operation, or test the contents of a specific backup for use in RESTORE operations. The contents of the backups are actually read and checked for corruption. You have the following validation options:.RESTORE ... VALIDATE tests whether RMAN can restore a specific object from a backup.RMAN chooses which backups to use.. VALIDATE BACKUPSET tests the validity of a backup set that you specify.Restoring Archived Redo Logs Needed for RecoveryRMAN restore archived redo log files from backup automatically as needed to perform recovery. You can also restore archived redo logs manually to save the time needed to restore these files later during the RECOVER command, or if you want to store the restored archived redo log files in some new location.By default, RMAN restores archived redo logs with names constructed using the LOG_ARCHIVE_FORMAT and the LOG_ARCHIVE_DEST_1 parameters of the target database. These parameters are combined in a platform-specific fashion to form the name of the restored archived log.Restoring Archived Redo Logs to a New LocationYou can override the default location for restored archived redo logs with the SET ARCHIVELOG DESTINATION command. This command manually stages archived logs to different locations while a database restore is occurring. During recovery, RMAN knows where to find the newly restored archived logs; it does not require them to be in the location specified in the initialization parameter file.To restore archived redo logs to a new location:1- After connecting to the target database, ensure the database is mounted or open.2- Perform the following operations within a RUN block:The following example explicitly restores all backup archived logs to a new location:{ SET ARCHIVELOG DESTINATION TO '/oracle/temp_restore'; RESTORE ARCHIVELOG ALL; # restore and recover datafiles as needed. . .}The following example sets the archived log destination and then uses RECOVER DATABASE to restore archived logs from this destination automatically:run c SET ARCHIVELOG DESTINATION TO '/oracle/temp_restore'; RESTORE DATABASE; RECOVER DATABASE; # restores and recovers logs automaticallyRestoring Archived Redo Logs to Multiple LocationsYou can specify restore destinations for archived logs multiple times in one RUN block, in order to distribute restored logs among several destinations. (You cannot, however specify multiple destinations simultaneously to produce multiple copies of the same log during the restore operation.) You can use this feature to manage disk space used to contain the restored logs.This example restores 300 archived redo logs from backup, distributing them across the directories /fs1/tmp, /fs2/tmp, and /fs3/tmp:RUN{ # Set a new location for logs 1 through 100. SET ARCHIVELOG DESTINATION TO '/ fs1/tmp'; RESTORE ARCHIVELOG FROM SEQUENCE 1 UNTIL SEQUENCE 100; # Set a new l ocation for logs 101 through 200. SET ARCHIVELOG DESTINATION TO '/fs2/tmp'; RESTORE ARCHIVELOG FROM SEQUENCE 101 UNTIL SEQUENCE 200; # Set a new location for logs 201 through 300. SET ARCHIVELOG DESTINATION TO ' /fs3/tmp';RESTORE FROM SEQUENCE 201 UNTIL SEQUENCE 300; # restore and recover datafiles as needed .\..0When you issue a RECOVER command, RMAN finds the needed restored archived logs automatically across the destinations to which they were restored, and applies them to the datafiles.Performing Complete Database RecoveryThis section assumes that you have already performed the tasks in "Preparing for Complete Database Recovery". This section describes the basic outline of complete database recovery, which is intended to encompass a wide range of different scenarios.About Complete Database RecoveryYou use the RESTORE and RECOVER commands to restore and recover the database. During the recovery, RMAN automatically restores backups of any needed archived redo logs. If backups are stored on a media manager, then channels must be configured in advance or a RUN block with ALLOCATE CHANNEL commands must be used to enable access to backups stored there.If RMAN restores archived redo logs to the flash recovery area during a recovery, then it automatically deletes the restored logs after they applying them to the datafiles. Otherwise, you can use the DELETE ARCHIVELOG command to delete restored archived redo logs from disk when they are no longer needed for recovery. For example, you can enter the following command:RECOVER DATABASE DELETE ARCHIVELOG;Restoring Datafiles to a Nondefault LocationIf you cannot restore datafiles to their default locations, then you must update the control file to reflect the new locations of the datafiles. Use the RMAN SET NEWNAME command within a RUN command to specify the new filename. Afterward, use a SWITCH command, which is equivalent to using the SQL statement ALTER DATABASE RENAME FILE, to update the names of the datafiles in the control file. SWITCH DATAFILE ALL updates the control file to reflect the new names for all datafiles for which a SET NEWNAME has been issued in a RUN command.Decryption of BackupsIf RMAN is restoring encrypted backups, then RMAN automatically decrypts backup sets when their contents are restored. Transparently encrypted backups require no intervention to restore, as long as the encrypted wallet is open and available.Password-encrypted backups require the correct password to be entered before they can be restored. You must enter the encryption password with the SET DECRYPTION command. If restoring from a group of backups that were created with different passwords, then specify all of the required passwords on the SET DECRYPTION command. RMAN will automatically use the correct password with each backup set.Performing Complete Recovery of the Whole DatabaseThis scenario assumes that database trgt has lost most or all of its datafiles. It also assumes that the database uses a flash recovery area.Note: After restore and recovery of a whole database, when the database is opened, any missing temporary tablespaces recorded in the control file are re-created with their previous creation size, AUTOEXTEND, and MAXSIZE attributes. Only temporary tablespaces that are missing are re-created. If a tempfile exists at the location recorded in the RMAN repository but has an invalid header, then RMAN does not re-create the tempfile.If the tempfiles were originally created as Oracle-managed files, then they are re-created in the current DB_CREATE_FILE_DEST location. Otherwise, they are re-created at their previous locations. If RMAN is unable to re-create the file due to an I/O error or some other cause, then the error is reported in the alert log and the database open operation continues.To restore and recover the whole database:1-Start RMAN and connect to the target database.For example, enter the following command:% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).2-If the database is not mounted, then mount but do not open the databaseFor example, enter the following command:STARTUP MOUNT;3-Use the SHOW command to see which channels are preconfigured.For example, enter the following command (sample output is included):SHOW ALL;RMAN configuration parameters for database with db_unique_name PROD1 are:..CONFIGURE DEFAULT DEVICE TYPE TO DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.If restoring password-protected encrypted backups, then specify the password.4-Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:SET DECRYPTION IDENTIFIED BY mypassword5-Restore and recover the database. Do one of the following:.If you are restoring all datafiles to their original locations, then execute RESTORE DATABASE and RECOVER DATABASE sequentially at the RMAN prompt.For example, enter the following commands if automatic channels are configured (sample output included):RMAN> RESTORE DATABASE;Starting restore at 20-JUN-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=35 device type=DISKallocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1:Oracle Secure Backupchannel ORA_DISK_1: starting datafile backup set restorechannel ORA_DISK_1: specifying datafile(s) to restore from backup setchannel ORA_DISK_1: restoring datafile 00001 to /disk1/oracle/dbs/tbs_01.fchannel ORA_DISK_1: restoring datafile 00002 to /disk1/oracle/dbs/tbs_ax1.f...Finished restore at 20-JUN-06RMAN>RECOVER DATABASE;Starting recover at 20-JUN-06using channel ORA_DISK_1allocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupstarting media recoverychannel ORA_DISK_1: starting archived log restore to default destinationchannel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=5channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=6.media recovery complete, elapsed time: 00:00:15Finished recover at 20-JUN-06If you manually allocate channels, then you must issue the RESTORE and RECOVER commands together within a RUN block as shown in the following example:RUN{ ALLOCATE CHANNEL c1 DEVICE TYPE sbt; RESTORE DATABASE; RECOVER DATABASE;}If you are restoring some datafiles to new locations,then execute RESTORE DATABASE and RECOVER DATABASE sequentially in a RUN command. Use the SET NEWNAME to rename datafiles,as described in "Restoring Datafiles to a Nondefault Location".The following example restores the database,specifying new names for three of the datafiles, and then recovers the database:RUN{ SET NEWNAME FOR DATAFILE 2 TO '/disk2/df2.dbf';SET NEWNAME FOR DATAFILE 3 TO '/disk2/df3.dbf';SET NEWNAME FOR DATAFILE 4 TO '/disk2/df4.dbf'; RESTORE DATABASE; SWITCH DATAFILE ALL; RECOVER DATABASE;}Examine the output to see if media 6-recovery was successful. If so, open the database.For example, enter the following command:ALTER DATABASE OPENPerforming Complete Recovery of a Tablespace\In the basic scenario, the database is open, and some but not all of the datafiles are damaged. You want to restore and recover the damaged tablespace while leaving the database open so that the rest of the database remains available. This scenario assumes that database trgt has lost tablespace tbs_3.Start RMAN and connect to the target database.For example, enter the following command:% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).2-If the database is not mounted, then mount but do not open the database.For example, enter the following command:STARTUP MOUNT;Use the SHOW command to see which channels are preconfigured.For example, enter the following command (sample output is included):SHOW ALL;3-RMAN configuration parameters for database with db_unique_name PROD1 are:...CONFIGURE DEFAULT DEVICE TYPE TO DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.4-If restoring password-protected encrypted backups, then specify the password.Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:SET DECRYPTION IDENTIFIED BY mypassword;Restore and recover the database. Do one of the following:If you are restoring all datafiles to their original locations, then execute RESTORE DATABASE and RECOVER DATABASE sequentially at the RMAN prompt.5-For example, enter the following commands if automatic channels are configured (sample output included):RMAN> RESTORE DATABASE;Starting restore at 20-JUN-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=35 device type=DISKallocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupchannel ORA_DISK_1: starting datafile backup set restorechannel ORA_DISK_1: specifying datafile(s) to restore from backup setchannel ORA_DISK_1: restoring datafile 00001 to /disk1/oracle/dbs/tbs_01.fchannel ORA_DISK_1: restoring datafile 00002 to /disk1/oracle/dbs/tbs_ax1.f...Finished restore at 20-JUN-06RMAN> RECOVER DATABASE;Starting recover at 20-JUN-06using channel ORA_DISK_1allocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupstarting media recoverychannel ORA_DISK_1: starting archived log restore to default destinationchannel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=5channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=6...channel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkp tag=TAG20070620T113128channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:02archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jhv47k_.arc thread=1 sequence=5channel default: deleting archived log(s)...media recovery complete, elapsed time: 00:00:15Finished recover at 20-JUN-06If you manually allocate channels, then you must issue the RESTORE and RECOVER commands together within a RUN block as shown in the following example:RUN{ ALLOCATE CHANNEL c1 DEVICE TYPE sbt; RESTORE DATABASE; RECOVER DATABASE;}If you are restoring some datafiles to new locations, then execute RESTORE DATABASE and RECOVER DATABASE sequentially in a RUN command. Use the SET NEWNAME to rename datafiles, as described in "Restoring Datafiles to a Nondefault Location"...The following example restores the database,specifying new names for three of the datafiles, and then recovers the database:RUN{ SET NEWNAME FOR DATAFILE 2 TO '/disk2/df2.dbf'; SET NEWNAME FOR DATAFILE 3 TO '/disk2/df3.dbf'; SET NEWNAME FOR DATAFILE 4 TO '/disk2/df4.dbf';RESTORE DATABASE; SWITCH DATAFILE ALL; RECOVER DATABASE;}Examine the output to see if media recovery was successful. If so, open the database.6-For example, enter the following command:ALTER DATABASEPerforming Complete Recovery of a TablespaceIn the basic scenario, the database is open, and some but not all of the datafiles are damaged. You want to restore and recover the damaged tablespace while leaving the database open so that the rest of the database remains available. This scenario assumes that database trgt has lost tablespace tbs_3.To restore and recover a tablespace:1-Start RMAN and connect to the target database.For example, enter the following command:% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).2-If the database is open, then take the datafile requiring recovery offline.For example, enter the following command to take tbs_3 offline:SQL "ALTER TABLESPACE tbs_3 OFFLINE IMMEDIATE";Use the SHOW command to see which channels are preconfigured.3-For example, enter the following command (sample output is included):SHOW ALL;RMAN configuration parameters for database withdb_unique_name PROD1 are:...CONFIGURE DEFAULT DEVICE TYPE TO DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TOBACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.4-If restoring password-protected backups, then specify the password.Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:SET DECRYPTION IDENTIFIED BY mypassword;Restore and recover the tablespace. Do one of the following:If you are restoring datafiles to their original locations, then run the RESTORE TABLESPACE and RECOVER TABLESPACE commands at the RMAN prompt.For example, enter the following command if automatic channels are configured (sample output included):RMAN> 5- RESTORE TABLESPACE tbs_3;Starting restore at 20-JUN-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=37 device type=DISKallocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=38 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupchannel ORA_DISK_1: starting datafile backup set restorechannel ORA_DISK_1: specifying datafile(s) to restore from backup setchannel ORA_DISK_1: restoring datafile 00012 to /disk1/oracle/dbs/tbs_31.fchannel ORA_DISK_1: restoring datafile 00013 to /disk1/oracle/dbs/tbs_32.fchannel ORA_DISK_1: restoring datafile 00021 to /disk1/oracle/dbs/tbs_33.fchannel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_nnndf_TAG20070620T105435_29jflwor_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_nnndf_TAG20070620T105435_29jflwor_.bkp tag=TAG20070620T105435channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:01Finished restore at 20-JUN-06RMAN> RECOVER TABLESPACE tbs_3;Starting recover at 20-JUN-06using channel ORA_DISK_1using channel ORA_SBT_TAPE_1starting media recoveryarchived log for thread 1 with sequence 27 is already on disk as file /disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_27_29jjmtc9_.arcarchived log for thread 1 with sequence 28 is already on disk as file /disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_28_29jjnc5x_.arc...channel ORA_DISK_1: starting archived log restore to default destinationchannel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=5channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=6channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=7...channel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkp tag=TAG20070620T113128channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:02archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jkdvjq_.arc thread=1 sequence=5channel default: deleting archived log(s)archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jkdvjq_.arc RECID=91 STAMP=593611179archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_6_29jkdvbz_.arc thread=1 sequence=6channel default: deleting archived log(s)...media recovery complete, elapsed time: 00:00:01Finished recover at 20-JUN-06If you are restoring some datafiles to new locations, then execute RESTORE TABLESPACE and RECOVER TABLESPACE in a RUN command. Use the SET NEWNAME to rename datafiles, as described in "Restoring Datafiles to a Nondefault Location".The following example restores the datafiles in tablespaces tbs_3 to a new location, then performs recovery. Assume that the old datafiles were stored in the /disk1 path and the new ones will be stored in the /disk2 path.RUN{ # specify the new location for each datafile SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_31.f' TO '/disk2/tbs_31.f'; SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_32.f' TO '/disk2/tbs_32.f'; SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_33.f' TO '/disk2/tbs_33.f'; RESTORE TABLESPACE tbs_3; SWITCH DATAFILE ALL; # update control file with new filenames RECOVER TABLESPACE tbs_3;}6-Examine the output to see if recovery was successful. If so, bring the recovered tablespace back online.For example, enter the following command:SQL "ALTER TABLESPACE tbs_3 ONLINEPerforming Complete Recovery of a Datafile After Switching to a CopyIf you have image copies of the inaccessible datafiles in the flash recovery area, then you can use the SWITCH DATAFILE ... TO COPY command to point the control file at the datafile copy and then use RECOVER to recover lost changes. When the original location can be used again, you can switch datafile back to the original location. Because you do not need to restore backups, this recovery technique takes less time than traditional restore and recovery.Note:A SWITCH TABLESPACE ... TO COPY command is also supported for cases when all datafiles in a tablespace are lost and copies of all datafiles exist.In the basic scenario, the database is open, and some but not all of the datafiles are damaged. During the course of the day, a datafile goes missing due to storage failure. You need to repair this file, but cannot afford the time to do a restore and recovery from a backup. You decide to use a recent image copy backup as the new file, thus eliminating restore timeThis scenario assumes that database trgt has lost datafile To switch to a datafile copy and perform recovery:1-Start RMAN and connect to the target database.For example, enter the following command:% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).2-If the database is open, then take the tablespace requiring recovery offline.For example, enter the following command to take datafile 4 offline:SQL "ALTER DATABASE DATAFILE 4 OFFLINE";3-Switch the offline datafile to the latest copy.For example, enter the following command to point the control file to the latest image copy of datafile 4:SWITCH DATAFILE 4 TO COPY;4-Recover the datafile with the RECOVER DATAFILE command.For example, enter the following command (sample output included):RECOVER DATAFILE 4;RMAN automatically restores archived redo logs and incremental backups. Because the database uses a flash recovery area, RMAN automatically deletes them after they have been applied.5-Examine the output to see if recovery was successful. If so, bring the recovered datafile back online.For example, enter the following command to bring datafile 4 online:SQL "ALTER DATABASE DATAFILE 4 ONLINE";http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/backup.111/b28270/rcmcomre.htm
Database Backup and RecoveryMost of database systems have incorporated backup and recovery tools into their interfaces and infrastructure it is a good idea to understand what the backup and recovery process involves, beyond the work flow of using the tools. With the growing dependency in the workplace on information and general, and the information in your database specifically, there has never been a time when safe backups and reliable recoveries were more important. Are you maintaining your databases properly? Do they participate in a backup and recovery routine that checks on the health of the data? If you are not 100% sure of this, then you need to find out.Database Backup and Recovery NeedsIt is not just the data files that need to be part of the backup process. You must also backup the transaction logs of the database as well. Without the transaction logs the data files are useless in a recovery event. How often you choose to perform these backup routines is really dependent on the data requirements of your company. If you do not know what those are then you need to find out either by referring to them or asking for them to be created through a research and investigation process.Backup and Recovery and Database FailureFailure can happen for any number of reasons. There are three main ones that recur enough to be worth incorporating into your backup and recovery plan. User error is the number one reason for data damage, loss, or corruption. Included in this type of failure is an application modifying or destroying the data on its own or through a user choice. Recovery and restore to the point in time before the corruption occurred.This returns the data to a clean position at the cost of any other changes that were being made to the data since the point the corruption took place. Any lost work will need to be re-entered or processes repeated if necessary.Media failure can also cause data loss or damage. Media failure can happen when the media the data files or transaction logs are stored on fail. Most databases will be stored on computer hard drives or across groups of hard drives on designated servers. Hard drives are mechanical devices, just like automobiles, and are made up of parts and pieces that work together. Mechanical devices are known for failure and will need to be replaced once, or if, the data has been retrieved from them.Backup and Recovery and DisasterThe third reason for database failure is a disastrous or catastrophic event. This can be in the form of fire, flood, or any naturally occurring storm. It can also happen through electrical outage, a virus, or the deliberate hacking of your data. Any of these can corrupt or cause the loss of your data. The true disaster will be the lack of data backup and or the lack of a recovery plan. Without data backup recovery is impossible. And without a recovery plan there is no guarantee that your data backup will make it through the recovery process.This chapter assumes that some or all of your datafiles are lost or damaged. Typically, this situation is caused by a media failure or accidental deletion. Your goal is to return the database to normal operation by restoring the damaged files from RMAN backups and recovering all database changes.Scope of This ChapterThis chapter explain how to use complete recovery to fix the most common database problems. This chapter makes the following assumptions:You have lost some or all datafiles and your goal is to recover all changes, but you have not lost all current control files or an entire online redo log group..Your database is using the current server parameter file..You have the complete set of archived redo logs and incremental backups needed for recovery of your datafile backups. Every datafile either has a backup, or a complete set of online and archived redo logs goes back to the creation of a datafile with no backup..RMAN can handle lost datafiles without user intervention during restore and recovery. When a datafile is lost, the possible cases can be classified as follows:oThe control file knows about the datafile, that is, you backed up the control file after datafile creation, but the datafile itself is not backed up. If the datafile record is in the control file, then RESTORE creates the datafile in the original location or in a user-specified location. The RECOVER command can then apply the necessary logs to the datafile.oThe control file does not have the datafile record, that is, you did not back up the control file after datafile creation. During recovery, the database will detect the missing datafile and report it to RMAN, which will create a new datafile and continue recovery by applying the remaining logs. If the datafile was created in a parent incarnation, then it will be created during the restore or recovery phase as appropriate..You are not restoring and recovering an encrypted tablespace.If you perform media recovery on an encrypted tablespace, then the Oracle wallet must be open when performing media recovery of this tablespace. See Oracle Database Administrator's Guide to learn about encrypted tablespaces..You are using the RMAN client rather than Oracle Enterprise Manager.Enterprise Manager provides access to RMAN through a set of wizards. These wizards lead you through a variety of recovery procedures based on an analysis of your database, your available backups, and your data recovery objectives.By using Enterprise Manager, you can perform the simpler restore and recovery scenarios outlined in this chapter. You can also use more sophisticated restore and recovery techniques such as point-in-time recovery and database flashback, which allow for efficient repair of media failures and user errors. In most cases, using Enterprise Manager is simpler than using the RMAN command-line client directlyPreparing for Complete Database RecoveryWhile RMAN simplifies most database restore and recovery tasks, you must still plan your database restore and recovery strategy based on which database files have been lost and your recovery goal. This section contains the following topics:.Identifying the Database Files to Restore or Recover.Determining the DBID of the Database.Previewing Backups Used in Restore Operations.Validating Backups Before Restoring Them.Restoring Archived Redo Logs Needed for RecoveryIdentifying the Database Files to Restore or RecoverThe techniques for determining which files require restore or recovery depend upon the type of file that is lost.It is usually obvious when the control file of your database is lost. The database shuts down immediately when any of the multiplexed control files becomes inaccessible. Also, the database reports an error if you try to start it without a valid control file at each location specified in the CONTROL_FILES initialization parameter.Loss of some but not all copies of your control file does not require you to restore a control file from backup. If at least one control file remains intact, then you can either copy an intact copy of the control file over the damaged or missing control file, or update the initialization parameter file so that it does not refer to the damaged or missing control file. After the CONTROL_FILES parameter references only present, intact copies of the control file, you can restart your database.If you restore the control file from backup, then you must perform media recovery of the whole database and then open it with the OPEN RESETLOGS option, even if no datafiles need to be restored. This technique is described in "Performing Recovery with a Backup Control File".Identifying Datafiles Requiring Media RecoveryWhen and how to recover depends on the state of the database and the location of its datafiles.Identifying Datafiles with RMANAn easy technique for determining which datafiles are missing is to run a VALIDATE DATABASE command, which attempts to read all specified datafiles. For example, start the RMAN client and run the following commands to validate the database (sample output included).Example 17-1 BACKUP VALIDATE DATABASERMAN> VALIDATE DATABASE;Starting validate at 20-OCT-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=90 device type=DISKcould not read file header for datafile 7 error reason 4RMAN-00571: ===========================================================RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============RMAN-00571: ===========================================================RMAN-03002: failure of backup command at 10/20/2007 13:05:43RMAN-06056: could not access datafile 7The output in Example 17-1 indicates that datafile 7 is inaccessible. You can then run the REPORT SCHEMA command to obtain the tablespace name and filename for datafile 7 as follows (sample output included):RMAN> REPORT SCHEMA;Report of database schemafor database with db_unique_nameRDBMSList of Permanent Datafiles===========================File Size(MB) Tablespace RB segs DatafileName---- -------- -------------------- ------- ------------------------1 450 SYSTEM *** +DATAFILE/tbs_01.f2 86 SYSAUX *** +DATAFILE/tbs_ax1.f3 15 UD1 *** +DATAFILE/tbs_undo1.f4 2 SYSTEM *** +DATAFILE/tbs_02.f5 2 TBS_1 *** +DATAFILE/tbs_11.f6 2 TBS_1 *** +DATAFILE/tbs_12.f7 2 TBS_2 *** +DATAFILE/tbs_21.fList of Temporary Files=======================File Size(MB) Tablespace Maxsize(MB) TempfileName---- -------- -------------------- ----------- --------------------1 40 TEMP 32767 +DATAFILE/tbs_tmp1.fAlthough VALIDATE DATABASE is a good technique for determining whether files are inaccessible, you may want to use SQL queries to obtain more detailed information.To determine whether datafiles require media recovery:1-Start SQL*Plus and connect to the target database instance. For example, issue the following commands to connect to trgt:sqlplusSQL> CONNECT SYS/password@trgt AS SYSDBA2-Determine the status of the database by executing the following SQL query:3-SELECT STATUS FROM V$INSTANCE;If the status is OPEN, then the database is open. Nevertheless, some datafiles may require media recovery.Query V$DATAFILE_HEADER to determine the status of your datafiles. Run the following SQL statements to check the datafile headers:COL FILE# FORMAT 999COL STATUS FORMAT A7COL ERROR FORMAT A10COL TABLESPACE_NAME FORMAT A10COL NAME FORMAT A30SELECT FILE#, STATUS, ERROR, RECOVER, TABLESPACE_NAME, NAMEFROM V$DATAFILE_HEADERWHERE RECOVER = 'YES'OR (RECOVER IS NULL AND ERROR IS NOT NULL);Each row returned represents a datafile that either requires media recovery or has an error requiring a restore. Check the RECOVER and ERROR columns. RECOVER indicates whether a file needs media recovery, and ERROR indicates whether there was an error reading and validating the datafile header.If ERROR is not NULL, then the datafile header cannot be read and validated. Check for a temporary hardware or operating system problem causing the error. If there is no such problem, you must restore the file or switch to a copy.If the ERROR column is NULL and the RECOVER column is YES, then the file requires media recovery (and may also require a restore from backup).Note:Because V$DATAFILE_HEADER only reads the header block of each datafile, it does not detect all problems that require the datafile to be restored. For example, this view cannot tell whether a datafile contains corrupt data blocks.4-Optionally, query V$RECOVER_FILE to list datafiles requiring recovery by datafile number with their status and error information. For example, execute the following querySELECT FILE#, ERROR, ONLINE_STATUS, CHANGE#, TIMEFROM V$RECOVER_FILE;Note:You cannot use V$RECOVER_FILE with a control file restored from backup or a control file that was re-created after the time of the media failure affecting the datafiles. A restored or re-created control file does not contain the information needed to update V$RECOVER_FILE accurately.To find datafile and tablespace names, you can also perform useful joins using the datafile number and the V$DATAFILE and V$TABLESPACE views. For example:COL DF# FORMAT 999COL DF_NAME FORMAT A35COL TBSP_NAME FORMAT A7COL STATUS FORMAT A7COL ERROR FORMAT A10COL CHANGE# FORMAT 99999999SELECT r.FILE# AS df#, d.NAME AS df_name,t.NAME AS tbsp_name, d.STATUS, r.ERROR, r.CHANGE#,r.TIMEFROM V$RECOVER_FILE r, V$DATAFILE d, V$TABLESPACE tWHERE t.TS# = d.TS#AND d.FILE# = r.FILE#;The ERROR column identifies the problem for each file requiring recovery.Determining the DBID of the DatabaseIn situations requiring the recovery of your server parameter file or control file from autobackup, you need to know the DBID. You should record the DBID along with other basic information about your database..If you do not have a record of the DBID of your database, then you can find it in the following places without opening your database:.The DBID is used in forming the filename for the control file autobackup. Locate this file, and then refer to "Configuring the Control File Autobackup Format" to determine where the DBID appears in the filename..If you have any text files that preserve the output from an RMAN session, then the DBID is displayed by the RMAN client when it starts up and connects to your database. Typical output follows:.% rman TARGET /Recovery Manager: Release 11.1.0.6.0 - Production on Wed Jul 11 17:51:30 2007Copyright (c) 1982, 2007, Oracle. All rights reserved.connected to target database: PROD (DBID=36508508Previewing Backupa Used in Restore OperationsYou can apply RESTORE ... PREVIEW to any RESTORE operation to create a detailed list of every backup to be used in the requested RESTORE operation, as well as the necessary target SCN for recovery after the RESTORE operation is complete. This command accesses the RMAN repository to query the backup metadata, but does not actually read the backup files to ensure that they can be restored.As an alternative to RESTORE ... PREVIEW, you can use the RESTORE ... VALIDATE HEADER command. In addition to listing the files needed for restore and recovery, the RESTORE ... VALIDATE HEADER command validates the backup file headers to determine whether the files on disk or in the media management catalog correspond to the metadata in the RMAN repository.When planning your restore and recovery operation, use RESTORE ... PREVIEW or RESTORE ... VALIDATE HEADER to ensure that all required backups are available or to identify situations in which you may want to direct RMAN to use or avoid specific backups.To preview backups to be used in a restore operation1-Run a RESTORE command with the PREVIEW option.For example, run one of the following commands:RESTORE DATABASE PREVIEW;RESTORE ARCHIVELOG FROM TIME 'SYSDATE-7' PREVIEW;If the report produced by RESTORE ... PREVIEW provides too much information, then specify the SUMMARY option as shown in the following example:RESTORE DATABASE PREVIEW SUMMARY;If satisfied with the output, then stop here. If the output indicates that RMAN will request a backup from a tape that you know is temporarily unavailable, then continue with this procedure. If the output indicates that a backup is stored offsite, then skip to "Recalling Offsite Backups".2-If needed, use the CHANGE command to set the backup status of any temporarily unavailable backups to UNAVAILABLE."Updating a Backup to Status AVAILABLE or UNAVAILABLE" explains how to perform this task.3-Optionally, run RESTORE ... PREVIEW again to confirm that the restore will not attempt to use unavailable backups.Recalling Offsite BackupsSome media managers provide status information to RMAN about which backups are offsite. An offsite backup is stored in a remote location, such as a secure storage facility, and cannot be restored unless the media manager retrieves the media.Offsite backups are marked as AVAILABLE in the RMAN repository even though the media must be retrieved from storage before the backup can be restored. If RMAN attempts to restore a offsite backup, then the restore job fails.You can use RESTORE ... PREVIEW to identify offsite backups. The command output indicates whether backups are stored offsite, as shown by the text at the end of the sample output in Example 17-2.List of Backup Sets===================BS Key Size Device Type Elapsed Time Completion Time------- ---------- ----------- ------------ ---------------9 2.25M SBT_TAPE 00:00:00 21-MAY-07 BP Key: 9 Status: AVAILABLE Compressed: NO Tag: TAG20070521T144258 Handle: 0aii9k7i_1_1 Media: 0aii9k7i_1_1 List of Archived Logs in backup set 9 Thrd Seq Low SCN Low Time Next SCN Next Time ---- ------- ---------- --------- ---------- ---------1 1 392314 21-MAY-07 392541 21-MAY-07 1 2 392541 21-MAY-07 392545 21-MAY-07 1 3 392545 21-MAY-07 392548 21-MAY-07 1 4 392548 21-MAY-07 395066 21-MAY-07 1 5 395066 21-MAY-07 395095 21-MAY-07 1 6 395095 21-MAY-07 395355 21-MAY-07List of remote backup files============================Handle: aii9k7i_1_1 Media: 0aii9k7i_1_1validation succeeded for backup pieceFinished restore at 21-MAY-07released channel: dev1You can use RESTORE ... PREVIEW RECALL to instruct the media manager to make offsite backups available.To recall offsite backups:1-If backups are stored offsite, then execute a RESTORE ... PREVIEW command with the RECALL option.The following example initiates recall for the offsite archived log backups shown in Example 17-2 (sample output included):RESTORE ARCHIVELOG ALL PREVIEW RECALL;The following sample output indicates that RMAN initiated a recall:List of Backup Sets===================BS Key Size Device Type Elapsed Time Completion Time------- ---------- ----------- ------------ ---------------9 2.25M SBT_TAPE 00:00:00 21-MAY-07 BP Key: 9 Status: AVAILABLE Compressed: NO Tag: TAG20070521T144258 Handle: VAULT0aii9k7i_1_1 Media: /tmp,VAULT0aii9k7i_1_1 List of Archived Logs in backup set 9 Thrd Seq Low SCN Low Time Next SCN Next Time---- ------- ---------- --------- ---------- --------- 1 1 392314 21-MAY-07 392541 21-MAY-07 1 2 392541 21-MAY-07 392545 21-MAY-07 1 3 392545 21-MAY-07 392548 21-MAY-07 1 4 392548 21-MAY-07 395066 21-MAY-07 1 5 395066 21-MAY-07 395095 21-MAY-07 1 6 395095 21-MAY-07 395355 21-MAY-07Initiated recall for the following list of remote backup files==========================================================Handle: VAULT0aii9k7i_1_1 Media: /tmp,VAULT0aii9k7i_1_1validation succeeded for backup pieceFinished restore at 21-MAY-07released channel: dev12-Run the RESTORE ... PREVIEW command. If necessary, return to the previous step until no backups needed for the restore are reported as offsite.Validating Backups Before Restoring ThemWhile the procedures in "Previewing Backups Used in Restore Operations" indicate which backups will be restored, they do not verify that the backups are actually usable. You can run RMAN commands to test the availability of usable backups for any RESTORE operation, or test the contents of a specific backup for use in RESTORE operations. The contents of the backups are actually read and checked for corruption. You have the following validation options:.RESTORE ... VALIDATE tests whether RMAN can restore a specific object from a backup.RMAN chooses which backups to use.. VALIDATE BACKUPSET tests the validity of a backup set that you specify.Restoring Archived Redo Logs Needed for RecoveryRMAN restore archived redo log files from backup automatically as needed to perform recovery. You can also restore archived redo logs manually to save the time needed to restore these files later during the RECOVER command, or if you want to store the restored archived redo log files in some new location.By default, RMAN restores archived redo logs with names constructed using the LOG_ARCHIVE_FORMAT and the LOG_ARCHIVE_DEST_1 parameters of the target database. These parameters are combined in a platform-specific fashion to form the name of the restored archived log.Restoring Archived Redo Logs to a New LocationYou can override the default location for restored archived redo logs with the SET ARCHIVELOG DESTINATION command. This command manually stages archived logs to different locations while a database restore is occurring. During recovery, RMAN knows where to find the newly restored archived logs; it does not require them to be in the location specified in the initialization parameter file.To restore archived redo logs to a new location:1- After connecting to the target database, ensure the database is mounted or open.2- Perform the following operations within a RUN block:The following example explicitly restores all backup archived logs to a new location:{ SET ARCHIVELOG DESTINATION TO '/oracle/temp_restore'; RESTORE ARCHIVELOG ALL; # restore and recover datafiles as needed. . .}The following example sets the archived log destination and then uses RECOVER DATABASE to restore archived logs from this destination automatically:run c SET ARCHIVELOG DESTINATION TO '/oracle/temp_restore'; RESTORE DATABASE; RECOVER DATABASE; # restores and recovers logs automaticallyRestoring Archived Redo Logs to Multiple LocationsYou can specify restore destinations for archived logs multiple times in one RUN block, in order to distribute restored logs among several destinations. (You cannot, however specify multiple destinations simultaneously to produce multiple copies of the same log during the restore operation.) You can use this feature to manage disk space used to contain the restored logs.This example restores 300 archived redo logs from backup, distributing them across the directories /fs1/tmp, /fs2/tmp, and /fs3/tmp:RUN{ # Set a new location for logs 1 through 100. SET ARCHIVELOG DESTINATION TO '/ fs1/tmp'; RESTORE ARCHIVELOG FROM SEQUENCE 1 UNTIL SEQUENCE 100; # Set a new l ocation for logs 101 through 200. SET ARCHIVELOG DESTINATION TO '/fs2/tmp'; RESTORE ARCHIVELOG FROM SEQUENCE 101 UNTIL SEQUENCE 200; # Set a new location for logs 201 through 300. SET ARCHIVELOG DESTINATION TO ' /fs3/tmp';RESTORE FROM SEQUENCE 201 UNTIL SEQUENCE 300; # restore and recover datafiles as needed .\..0When you issue a RECOVER command, RMAN finds the needed restored archived logs automatically across the destinations to which they were restored, and applies them to the datafiles.Performing Complete Database RecoveryThis section assumes that you have already performed the tasks in "Preparing for Complete Database Recovery". This section describes the basic outline of complete database recovery, which is intended to encompass a wide range of different scenarios.About Complete Database RecoveryYou use the RESTORE and RECOVER commands to restore and recover the database. During the recovery, RMAN automatically restores backups of any needed archived redo logs. If backups are stored on a media manager, then channels must be configured in advance or a RUN block with ALLOCATE CHANNEL commands must be used to enable access to backups stored there.If RMAN restores archived redo logs to the flash recovery area during a recovery, then it automatically deletes the restored logs after they applying them to the datafiles. Otherwise, you can use the DELETE ARCHIVELOG command to delete restored archived redo logs from disk when they are no longer needed for recovery. For example, you can enter the following command:RECOVER DATABASE DELETE ARCHIVELOG;Restoring Datafiles to a Nondefault LocationIf you cannot restore datafiles to their default locations, then you must update the control file to reflect the new locations of the datafiles. Use the RMAN SET NEWNAME command within a RUN command to specify the new filename. Afterward, use a SWITCH command, which is equivalent to using the SQL statement ALTER DATABASE RENAME FILE, to update the names of the datafiles in the control file. SWITCH DATAFILE ALL updates the control file to reflect the new names for all datafiles for which a SET NEWNAME has been issued in a RUN command.Decryption of BackupsIf RMAN is restoring encrypted backups, then RMAN automatically decrypts backup sets when their contents are restored. Transparently encrypted backups require no intervention to restore, as long as the encrypted wallet is open and available.Password-encrypted backups require the correct password to be entered before they can be restored. You must enter the encryption password with the SET DECRYPTION command. If restoring from a group of backups that were created with different passwords, then specify all of the required passwords on the SET DECRYPTION command. RMAN will automatically use the correct password with each backup set.Performing Complete Recovery of the Whole DatabaseThis scenario assumes that database trgt has lost most or all of its datafiles. It also assumes that the database uses a flash recovery area.Note: After restore and recovery of a whole database, when the database is opened, any missing temporary tablespaces recorded in the control file are re-created with their previous creation size, AUTOEXTEND, and MAXSIZE attributes. Only temporary tablespaces that are missing are re-created. If a tempfile exists at the location recorded in the RMAN repository but has an invalid header, then RMAN does not re-create the tempfile.If the tempfiles were originally created as Oracle-managed files, then they are re-created in the current DB_CREATE_FILE_DEST location. Otherwise, they are re-created at their previous locations. If RMAN is unable to re-create the file due to an I/O error or some other cause, then the error is reported in the alert log and the database open operation continues.To restore and recover the whole database:1-Start RMAN and connect to the target database.For example, enter the following command:% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).2-If the database is not mounted, then mount but do not open the databaseFor example, enter the following command:STARTUP MOUNT;3-Use the SHOW command to see which channels are preconfigured.For example, enter the following command (sample output is included):SHOW ALL;RMAN configuration parameters for database with db_unique_name PROD1 are:..CONFIGURE DEFAULT DEVICE TYPE TO DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.If restoring password-protected encrypted backups, then specify the password.4-Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:SET DECRYPTION IDENTIFIED BY mypassword5-Restore and recover the database. Do one of the following:.If you are restoring all datafiles to their original locations, then execute RESTORE DATABASE and RECOVER DATABASE sequentially at the RMAN prompt.For example, enter the following commands if automatic channels are configured (sample output included):RMAN> RESTORE DATABASE;Starting restore at 20-JUN-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=35 device type=DISKallocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1:Oracle Secure Backupchannel ORA_DISK_1: starting datafile backup set restorechannel ORA_DISK_1: specifying datafile(s) to restore from backup setchannel ORA_DISK_1: restoring datafile 00001 to /disk1/oracle/dbs/tbs_01.fchannel ORA_DISK_1: restoring datafile 00002 to /disk1/oracle/dbs/tbs_ax1.f...Finished restore at 20-JUN-06RMAN>RECOVER DATABASE;Starting recover at 20-JUN-06using channel ORA_DISK_1allocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupstarting media recoverychannel ORA_DISK_1: starting archived log restore to default destinationchannel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=5channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=6.media recovery complete, elapsed time: 00:00:15Finished recover at 20-JUN-06If you manually allocate channels, then you must issue the RESTORE and RECOVER commands together within a RUN block as shown in the following example:RUN{ ALLOCATE CHANNEL c1 DEVICE TYPE sbt; RESTORE DATABASE; RECOVER DATABASE;}If you are restoring some datafiles to new locations,then execute RESTORE DATABASE and RECOVER DATABASE sequentially in a RUN command. Use the SET NEWNAME to rename datafiles,as described in "Restoring Datafiles to a Nondefault Location".The following example restores the database,specifying new names for three of the datafiles, and then recovers the database:RUN{ SET NEWNAME FOR DATAFILE 2 TO '/disk2/df2.dbf';SET NEWNAME FOR DATAFILE 3 TO '/disk2/df3.dbf';SET NEWNAME FOR DATAFILE 4 TO '/disk2/df4.dbf'; RESTORE DATABASE; SWITCH DATAFILE ALL; RECOVER DATABASE;}Examine the output to see if media 6-recovery was successful. If so, open the database.For example, enter the following command:ALTER DATABASE OPENPerforming Complete Recovery of a Tablespace\In the basic scenario, the database is open, and some but not all of the datafiles are damaged. You want to restore and recover the damaged tablespace while leaving the database open so that the rest of the database remains available. This scenario assumes that database trgt has lost tablespace tbs_3.Start RMAN and connect to the target database.For example, enter the following command:% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).2-If the database is not mounted, then mount but do not open the database.For example, enter the following command:STARTUP MOUNT;Use the SHOW command to see which channels are preconfigured.For example, enter the following command (sample output is included):SHOW ALL;3-RMAN configuration parameters for database with db_unique_name PROD1 are:...CONFIGURE DEFAULT DEVICE TYPE TO DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.4-If restoring password-protected encrypted backups, then specify the password.Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:SET DECRYPTION IDENTIFIED BY mypassword;Restore and recover the database. Do one of the following:If you are restoring all datafiles to their original locations, then execute RESTORE DATABASE and RECOVER DATABASE sequentially at the RMAN prompt.5-For example, enter the following commands if automatic channels are configured (sample output included):RMAN> RESTORE DATABASE;Starting restore at 20-JUN-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=35 device type=DISKallocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupchannel ORA_DISK_1: starting datafile backup set restorechannel ORA_DISK_1: specifying datafile(s) to restore from backup setchannel ORA_DISK_1: restoring datafile 00001 to /disk1/oracle/dbs/tbs_01.fchannel ORA_DISK_1: restoring datafile 00002 to /disk1/oracle/dbs/tbs_ax1.f...Finished restore at 20-JUN-06RMAN> RECOVER DATABASE;Starting recover at 20-JUN-06using channel ORA_DISK_1allocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupstarting media recoverychannel ORA_DISK_1: starting archived log restore to default destinationchannel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=5channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=6...channel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkp tag=TAG20070620T113128channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:02archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jhv47k_.arc thread=1 sequence=5channel default: deleting archived log(s)...media recovery complete, elapsed time: 00:00:15Finished recover at 20-JUN-06If you manually allocate channels, then you must issue the RESTORE and RECOVER commands together within a RUN block as shown in the following example:RUN{ ALLOCATE CHANNEL c1 DEVICE TYPE sbt; RESTORE DATABASE; RECOVER DATABASE;}If you are restoring some datafiles to new locations, then execute RESTORE DATABASE and RECOVER DATABASE sequentially in a RUN command. Use the SET NEWNAME to rename datafiles, as described in "Restoring Datafiles to a Nondefault Location"...The following example restores the database,specifying new names for three of the datafiles, and then recovers the database:RUN{ SET NEWNAME FOR DATAFILE 2 TO '/disk2/df2.dbf'; SET NEWNAME FOR DATAFILE 3 TO '/disk2/df3.dbf'; SET NEWNAME FOR DATAFILE 4 TO '/disk2/df4.dbf';RESTORE DATABASE; SWITCH DATAFILE ALL; RECOVER DATABASE;}Examine the output to see if media recovery was successful. If so, open the database.6-For example, enter the following command:ALTER DATABASEPerforming Complete Recovery of a TablespaceIn the basic scenario, the database is open, and some but not all of the datafiles are damaged. You want to restore and recover the damaged tablespace while leaving the database open so that the rest of the database remains available. This scenario assumes that database trgt has lost tablespace tbs_3.To restore and recover a tablespace:1-Start RMAN and connect to the target database.For example, enter the following command:% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).2-If the database is open, then take the datafile requiring recovery offline.For example, enter the following command to take tbs_3 offline:SQL "ALTER TABLESPACE tbs_3 OFFLINE IMMEDIATE";Use the SHOW command to see which channels are preconfigured.3-For example, enter the following command (sample output is included):SHOW ALL;RMAN configuration parameters for database withdb_unique_name PROD1 are:...CONFIGURE DEFAULT DEVICE TYPE TO DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TOBACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.4-If restoring password-protected backups, then specify the password.Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:SET DECRYPTION IDENTIFIED BY mypassword;Restore and recover the tablespace. Do one of the following:If you are restoring datafiles to their original locations, then run the RESTORE TABLESPACE and RECOVER TABLESPACE commands at the RMAN prompt.For example, enter the following command if automatic channels are configured (sample output included):RMAN> 5- RESTORE TABLESPACE tbs_3;Starting restore at 20-JUN-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=37 device type=DISKallocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=38 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupchannel ORA_DISK_1: starting datafile backup set restorechannel ORA_DISK_1: specifying datafile(s) to restore from backup setchannel ORA_DISK_1: restoring datafile 00012 to /disk1/oracle/dbs/tbs_31.fchannel ORA_DISK_1: restoring datafile 00013 to /disk1/oracle/dbs/tbs_32.fchannel ORA_DISK_1: restoring datafile 00021 to /disk1/oracle/dbs/tbs_33.fchannel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_nnndf_TAG20070620T105435_29jflwor_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_nnndf_TAG20070620T105435_29jflwor_.bkp tag=TAG20070620T105435channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:01Finished restore at 20-JUN-06RMAN> RECOVER TABLESPACE tbs_3;Starting recover at 20-JUN-06using channel ORA_DISK_1using channel ORA_SBT_TAPE_1starting media recoveryarchived log for thread 1 with sequence 27 is already on disk as file /disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_27_29jjmtc9_.arcarchived log for thread 1 with sequence 28 is already on disk as file /disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_28_29jjnc5x_.arc...channel ORA_DISK_1: starting archived log restore to default destinationchannel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=5channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=6channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=7...channel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkp tag=TAG20070620T113128channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:02archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jkdvjq_.arc thread=1 sequence=5channel default: deleting archived log(s)archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jkdvjq_.arc RECID=91 STAMP=593611179archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_6_29jkdvbz_.arc thread=1 sequence=6channel default: deleting archived log(s)...media recovery complete, elapsed time: 00:00:01Finished recover at 20-JUN-06If you are restoring some datafiles to new locations, then execute RESTORE TABLESPACE and RECOVER TABLESPACE in a RUN command. Use the SET NEWNAME to rename datafiles, as described in "Restoring Datafiles to a Nondefault Location".The following example restores the datafiles in tablespaces tbs_3 to a new location, then performs recovery. Assume that the old datafiles were stored in the /disk1 path and the new ones will be stored in the /disk2 path.RUN{ # specify the new location for each datafile SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_31.f' TO '/disk2/tbs_31.f'; SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_32.f' TO '/disk2/tbs_32.f'; SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_33.f' TO '/disk2/tbs_33.f'; RESTORE TABLESPACE tbs_3; SWITCH DATAFILE ALL; # update control file with new filenames RECOVER TABLESPACE tbs_3;}6-Examine the output to see if recovery was successful. If so, bring the recovered tablespace back online.For example, enter the following command:SQL "ALTER TABLESPACE tbs_3 ONLINEPerforming Complete Recovery of a Datafile After Switching to a CopyIf you have image copies of the inaccessible datafiles in the flash recovery area, then you can use the SWITCH DATAFILE ... TO COPY command to point the control file at the datafile copy and then use RECOVER to recover lost changes. When the original location can be used again, you can switch datafile back to the original location. Because you do not need to restore backups, this recovery technique takes less time than traditional restore and recovery.Note:A SWITCH TABLESPACE ... TO COPY command is also supported for cases when all datafiles in a tablespace are lost and copies of all datafiles exist.In the basic scenario, the database is open, and some but not all of the datafiles are damaged. During the course of the day, a datafile goes missing due to storage failure. You need to repair this file, but cannot afford the time to do a restore and recovery from a backup. You decide to use a recent image copy backup as the new file, thus eliminating restore timeThis scenario assumes that database trgt has lost datafile To switch to a datafile copy and perform recovery:1-Start RMAN and connect to the target database.For example, enter the following command:% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).2-If the database is open, then take the tablespace requiring recovery offline.For example, enter the following command to take datafile 4 offline:SQL "ALTER DATABASE DATAFILE 4 OFFLINE";3-Switch the offline datafile to the latest copy.For example, enter the following command to point the control file to the latest image copy of datafile 4:SWITCH DATAFILE 4 TO COPY;4-Recover the datafile with the RECOVER DATAFILE command.For example, enter the following command (sample output included):RECOVER DATAFILE 4;RMAN automatically restores archived redo logs and incremental backups. Because the database uses a flash recovery area, RMAN automatically deletes them after they have been applied.5-Examine the output to see if recovery was successful. If so, bring the recovered datafile back online.For example, enter the following command to bring datafile 4 online:SQL "ALTER DATABASE DATAFILE 4 ONLINE";http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/backup.111/b28270/rcmcomre.htm
ICAS4106B Action and complete change requests


ICAS4106B Action and complete change requests
Review change requests1. Receive and document requests for hardware and software changes, utilising a change management system and according to organisational help desk procedures 2. Gather and organise system data relevant to the change requests, using available diagnostic tools 3. Review the proposed changes against current and future business requirements and examine the system data, with work team, in order to select appropriate changes to be carried out 4. Discuss and clarify the selected changes with clientModify system according to requested changes 1. Develop a plan, with prioritised tasks and contingency arrangements, for modification of the system 2. Undertake the selected system changes according to organisational guidelines and procedures and in accordance with manufacturer recommendations 3. Test the system changes for performance and identify problems 4. Resolve identified problems 5. Revise relevant client and technical documentation to reflect system changes according to organisational standards 6. Notify client of status of change and update change management system, as per organisational help desk proceduresProjectTrack 2007 - Personal Edition OverviewThe Personal Edition of ProjectTrack is targeted to anyone that needs to manage projects in a single user environment. ProjectTrack compliments applications such as MS Project, but does not replace them. Rather than a planning tool, ProjectTrack is a program to help you execute your plan; saving you time with all the administrative work that surrounds projects.or example, if you use a spreadsheet or word processor to keep track of action items (to-dos), issues, milestones, etc. You can use ProjectTrack to keep track of all those items from a single location. You can have multiple companies and projects, each one of them with its own set of information. But keeping track of things is not all you can do with ProjectTrack. Most projects generate documents that need to be easily accessible. They can be linked directly to the project, saving time and stress searching. What about looking for a document related to a project that was finished some time ago? With ProjectTrack, the document can remain linked for easy access.If, during the course of a year, you spend 2 or more hours looking for documents in your computer, ProjectTrack will pay for itself.The best way to decide if ProjectTrack is right for you is to try it. Download our evaluation version and decide for yourself. This version doesn't have any limitations, but it will remind you to register after 30 days. Key termsHardware: May include but is not limited to workstations, personal computers, modems or other connectivity devices, networks, DSL modems, remote sites, serversSoftware: May include but is not limited to commercial, in-house, packaged or customised softwareSystem: May include but is not limited to the hardware and software components that run a computer.Requirements: May be in reference to the business, system, application, network or people in the organisation.Client: May include but is not limited to internal departments, external organisations, individual people and employees.Organisational guidelines: May include but are not limited to personal use of emails and internet access, content of emails, downloading information and accessing particular websites, opening mail with attachments, virus risk, dispute resolution, document procedures and templates, communication methods and financial control mechanisms.Technical documentation: May include project specifications, reports, help references, technical manuals, training materials and self-paced tutorials, on-line help, user guides, brochures.Standards: May include ISO/IEC/AS standards, organisational standards, project standards (for further information refer to the Standards Australia website at: www.standards.com.au).Documentation: May follow ISO/IEC/AS standards, audit trails, naming standards, version control, project management templates and report writing, maintaining equipment inventory; client training and satisfaction reports.Help desk procedures: May include:· customer contact centre or general contact point that then consults with a supplier or other technician· customer contact centre staffed by technicians capable of solving problems· real-time on-line support· web-based support.
Review change requests1. Receive and document requests for hardware and software changes, utilising a change management system and according to organisational help desk procedures 2. Gather and organise system data relevant to the change requests, using available diagnostic tools 3. Review the proposed changes against current and future business requirements and examine the system data, with work team, in order to select appropriate changes to be carried out 4. Discuss and clarify the selected changes with clientModify system according to requested changes 1. Develop a plan, with prioritised tasks and contingency arrangements, for modification of the system 2. Undertake the selected system changes according to organisational guidelines and procedures and in accordance with manufacturer recommendations 3. Test the system changes for performance and identify problems 4. Resolve identified problems 5. Revise relevant client and technical documentation to reflect system changes according to organisational standards 6. Notify client of status of change and update change management system, as per organisational help desk proceduresProjectTrack 2007 - Personal Edition OverviewThe Personal Edition of ProjectTrack is targeted to anyone that needs to manage projects in a single user environment. ProjectTrack compliments applications such as MS Project, but does not replace them. Rather than a planning tool, ProjectTrack is a program to help you execute your plan; saving you time with all the administrative work that surrounds projects.or example, if you use a spreadsheet or word processor to keep track of action items (to-dos), issues, milestones, etc. You can use ProjectTrack to keep track of all those items from a single location. You can have multiple companies and projects, each one of them with its own set of information. But keeping track of things is not all you can do with ProjectTrack. Most projects generate documents that need to be easily accessible. They can be linked directly to the project, saving time and stress searching. What about looking for a document related to a project that was finished some time ago? With ProjectTrack, the document can remain linked for easy access.If, during the course of a year, you spend 2 or more hours looking for documents in your computer, ProjectTrack will pay for itself.The best way to decide if ProjectTrack is right for you is to try it. Download our evaluation version and decide for yourself. This version doesn't have any limitations, but it will remind you to register after 30 days. Key termsHardware: May include but is not limited to workstations, personal computers, modems or other connectivity devices, networks, DSL modems, remote sites, serversSoftware: May include but is not limited to commercial, in-house, packaged or customised softwareSystem: May include but is not limited to the hardware and software components that run a computer.Requirements: May be in reference to the business, system, application, network or people in the organisation.Client: May include but is not limited to internal departments, external organisations, individual people and employees.Organisational guidelines: May include but are not limited to personal use of emails and internet access, content of emails, downloading information and accessing particular websites, opening mail with attachments, virus risk, dispute resolution, document procedures and templates, communication methods and financial control mechanisms.Technical documentation: May include project specifications, reports, help references, technical manuals, training materials and self-paced tutorials, on-line help, user guides, brochures.Standards: May include ISO/IEC/AS standards, organisational standards, project standards (for further information refer to the Standards Australia website at: www.standards.com.au).Documentation: May follow ISO/IEC/AS standards, audit trails, naming standards, version control, project management templates and report writing, maintaining equipment inventory; client training and satisfaction reports.Help desk procedures: May include:· customer contact centre or general contact point that then consults with a supplier or other technician· customer contact centre staffed by technicians capable of solving problems· real-time on-line support· web-based support.
ICAS4022B Determine and plan problem resolution (ICA05)

ICAS4022B Determine and plan problem resolution
This unit will present a series of troubleshooting and fault finding methods to help you enhance your chance of success when trying to fix computer problems. Technicians in the workplace are expected to rectify faults quickly, or provide a workaround or solution. You will learn to create a list of possible causes for faults, organise in order of likelihood of each cause and formulate a solution or rectification.Outcomes for this unit are:\.Create a list of probable causes lti(0)disk(0)rdisk(0)partition(1)\winnt=‘Windows 2000 Professional’/fastdetect/MAXMEM=32 .Login Box prompt appears after user presses CTRL + ALT + DEL simultaneously .User enters required credentials (username, password, domain/preferred server) .Network server validates user login (credentials are accepted) .User logged inAn actual graphical representation of this (actual HTA diagram) is shown below.Activity 5: Cause and Effect AnalysisThis is activity will require you to practise developing a Cause and Effect [fishbone] diagram.Take the sample from the previous activity—A user that attempts to loginQ: Assume that the user was not able to login successfully and develop a fishbone diagram that analyses the possible causes for this user not being able to loginA: One of a possible solution for the fishbone diagram is presented below:Key termsBoot-up time faults: Boot-up time faults are those faults that occur during the boot-up sequence.Cause-and-Effect Diagram: A graphic tool that helps identify, sort, and display possible causes of a problem or quality characteristic. These diagrams sometimes are knows as fishbone diagrams due to their shape.Cause and Effect Analysis (CEA): Cause and effect is a method which allows a technician to analyse the possible causes of faults (the undesired negative effects). The Cause and Effect method is usually implemented by using Cause and Effect diagrams.Fault Tree Analysis (FTA): Fault tree analysis is the process of analysing a fault by using a decision tree. Decision trees can be constructed in advance, for common troubleshooting tasks or they can be constructed ad-hoc for new faults.Hierarchical Task Analysis (HTA): HTA is a logical representation of a process and steps that must occur for this process to begin and finish successfully.Master Boot Record (MBR): The sector at the beginning of a hard disk that contains bootstrap information, to begin loading an operating system.POST: POST or Power-On-Self-Test is an initial test that a computer system executes automatically when turned on to check system integrity.Virtual Memory: Virtual memory is the area of a hard disk drive used to fake memory (RAM). When a system runs out of physical RAM, it relies on available hard disk space to provide working storage
This unit will present a series of troubleshooting and fault finding methods to help you enhance your chance of success when trying to fix computer problems. Technicians in the workplace are expected to rectify faults quickly, or provide a workaround or solution. You will learn to create a list of possible causes for faults, organise in order of likelihood of each cause and formulate a solution or rectification.Outcomes for this unit are:\.Create a list of probable causes lti(0)disk(0)rdisk(0)partition(1)\winnt=‘Windows 2000 Professional’/fastdetect/MAXMEM=32 .Login Box prompt appears after user presses CTRL + ALT + DEL simultaneously .User enters required credentials (username, password, domain/preferred server) .Network server validates user login (credentials are accepted) .User logged inAn actual graphical representation of this (actual HTA diagram) is shown below.Activity 5: Cause and Effect AnalysisThis is activity will require you to practise developing a Cause and Effect [fishbone] diagram.Take the sample from the previous activity—A user that attempts to loginQ: Assume that the user was not able to login successfully and develop a fishbone diagram that analyses the possible causes for this user not being able to loginA: One of a possible solution for the fishbone diagram is presented below:Key termsBoot-up time faults: Boot-up time faults are those faults that occur during the boot-up sequence.Cause-and-Effect Diagram: A graphic tool that helps identify, sort, and display possible causes of a problem or quality characteristic. These diagrams sometimes are knows as fishbone diagrams due to their shape.Cause and Effect Analysis (CEA): Cause and effect is a method which allows a technician to analyse the possible causes of faults (the undesired negative effects). The Cause and Effect method is usually implemented by using Cause and Effect diagrams.Fault Tree Analysis (FTA): Fault tree analysis is the process of analysing a fault by using a decision tree. Decision trees can be constructed in advance, for common troubleshooting tasks or they can be constructed ad-hoc for new faults.Hierarchical Task Analysis (HTA): HTA is a logical representation of a process and steps that must occur for this process to begin and finish successfully.Master Boot Record (MBR): The sector at the beginning of a hard disk that contains bootstrap information, to begin loading an operating system.POST: POST or Power-On-Self-Test is an initial test that a computer system executes automatically when turned on to check system integrity.Virtual Memory: Virtual memory is the area of a hard disk drive used to fake memory (RAM). When a system runs out of physical RAM, it relies on available hard disk space to provide working storage
ICAD4217A_Create_Technical_Documentation
ICAD4217B Create technical documentation
There are many reasons for maintaining a complete and up-to-date library of systems and procedures for documentation. Without documentation that has meaning to the users, time may be wasted dealing with technical problems by duplicating answers to problems that have already been solved.Other reasons for creating accurate, complete technical documentation include to:. pass an audit, or quality certification . create an accurate record of an organisation’s systems. record maintenance . identify the need to upgrade systems . provide records for future decisions . provide workers and stakeholders with a database for their jobs . ensure work and service quality is consistent when staff changes occur . add value to the organisation’s business and service. Technical documentation provides a record of the functionality and processing of a system, program, network or application. The technical documentation should document how the system, program, network or application is structured, how it works and changes that have been made to it.Task 1: Determine documentation standardsQ: Make a list of ten objects that you can see or feel from where you sit, that have technical documentation associated with them.Q: Make a list of ten objects that you can see or feel from where you sit, that have technical documentation associated with them.A: Answers for this question will vary, there are some example following:1-When you switched on your computer, a technical document (a log in the computer’s memory) was created. 2-The software you are using was installed using technical documentation. 3-When you switch on your lights, a record is kept for billing purposes. 4-The chair you sit on was made from a plan. 5-The mobile phone on your desk has a help function. 6-When the chair was made, a quality check was recorded. 7-The air you breathe is monitored for pollution records. 8-The time on the clock is set to an agreed, international standard. 9-The clothes you wear were made to a pattern. 10Your health is recorded in doctor’s files.Activity 2: Identify documentation standardsQ: Identify at least two industry standards that relate to documentation. Use search terms such as: standards, documentation, technical, industry in your preferred search engine.A: International Standards Organisation ISO 9000 Quality Standards (which is a family of different standards) that requires the processes involved in technical documentation to meet a certain level of quality, theses standards concern quality management systems. The Australian Standard AS ISO 10013-2003 relates to the documentation for the quality management system. ISO 14000 standards relate to environmental aspects of processes and can relate to such things as disposal and storage of documents and the media chosen for publishing documents. The ISO 9000 and ISO 14000 families of standards are those from which many organisation-based standards are derived.There are many standards that can apply to software used by documentation and used in the delivery of documentation. Two groups of specific standards that relate to the design and production of technical documentation are the Australian Standards for Editing Practice produced by the Institute of Professional Editors (IPed), formerly the Council of Australian Societies of Editors (CASE), and the World Wide Web Consortium (W3C) onscreen accessibility guidelines. You may have found others that relate more specifically to your own study or work area.Task 2: Determine technical documentation requirements Activity 1: Documentation for programsNote the following scenarioYour organisation’s software development team has been complying with all the documentation requirements for the development of new programs, except for one issue.The comments in their code, telling others what they’re trying to do with their program are random, cryptic, and inconsistent.You are asked to write specifications for comments in programs. The conventions should apply to any of the languages used by the programmers for the organisation. The constraints and rules imposed on programs should be as simple as possible.Q: What are some specifications that could be used for commenting within a program? Interview someone working in software programming or search the web for some sample specificationsA: The specifications for comments within the code could include that:.an overall comment should be included at the start of the program to identify the . framework of the program or changes to the program . comments should be used to describe the code that is not apparent . all comments should be preceded by a blank line. arguments should be commented if they are not clear. comments should be aligned with the code.Activity 2: Documentation requirementsQ: Think about the last time you purchased something that required installation or that you had to put together yourself. Did it come with instructions? Were the instructions complete, comprehensive, useful, coherent, accurate, accessible and clear? Did they help you or did you not refer to them at all?A: The answer is depending on the product that i have bougth, if that product was the thing i have been used before. I am ever read or look at the instructions. However, if the product is come with the new technology or i never been use it for long time or that product is quite expensive. I might read through very quick to get some useful information.Activity 3: The pros and cons of paperQ: There are probably times when you would use one medium in preference to another. What do you think are the advantages and disadvantages of paper-based documentation as a means of learning about a program or a system?A: Some of the advantages of paper-based documentation include:.most people feel comfortable with books—they can write notes in them and they can .read them without a computer .they have the benefit of using the actual software while following the manual . paper as a physical medium is easily handled by the user .novice users, or those who are not computer literate may not be able to use on-line help .paper-based documentation allows the user to add in their notes and bookmarks .manuals can be modular to target the needs of various user groups .paper-based documentation is portable, and production costs are less when compared to some other forms of digital media (DVDs etc) .paper can sometimes offer greater detail than other media. Some of the disadvantages of paper-based documentation include:paper deteriorates physically over time with use a manual is more difficult to update and provide flexible access methods it can not include sound or animation the physical size of a manual can be intimidating, which can put people off paper documentation must be massive to be able to cater for all the user needs, but individual users will usually only use parts of it it may cause the user to shift concentration from what they are doing to the manual.Activity 4: The pros and cons of digital mediaQ: What do you think are the advantages and disadvantages of digital or computer-based documentation (other than video) as a means of learning about a program or a system?A: The advantages of computer-based documentation include that:.it can be flexible, provide vast amounts of information, and can integrate sound, text and animation .it can be context-sensitive, providing help directly relevant to the function being used or to the task .it is of great value in training and in advanced help features, like wizards and cue cards .it is easy to update and revise, efficient to store, and cheap to distribute .it can allow interaction no paper is needed .it has cheaper packaging (CDs) immediate reference is possible (you don’t have to search for the manual).The disadvantages of computer-based documentation include that:it requires computer literacy it often requires various plug ins to access files the computer screen places limitations on use it may require swapping from the task to the documentation, causing distraction from the task at hand as video it can take up large amounts of memory and be cumbersome to download. Activity 5: The pros and cons of videoQ: Describe some and advantages and disadvantages of using video-based documentation to learn about a program or system?A: The advantages of video-based documentation include that:.it can provide a rehearsed and thorough demonstration or walk-through of a software application .it best suited for presenting animation, sound, graphics and ‘real-life’ presentations .it is good for training and promotion .learner retention is generally higher than for printed media (it is generally more engaging) .suitable for groups as well as individuals .DVDs are inexpensive and easy to distribute (although development costs may be high) no paper is needed. The disadvantages of video-based documentation include that: video requires specialist equipment and personnel to produce; the cost may be high for complex, multimedia material sequential access—while video is good for demonstrating sequential tasks, it is unsuitable for random access tasks as found for example in reference guides .it is non-interactive and does not cater for different levels of users .it can be easy to pirate .it is expensive to update—a new video must be produced (rather than a new version of a paper of digital print resource) documentation is less detailed if reliant on video only.
There are many reasons for maintaining a complete and up-to-date library of systems and procedures for documentation. Without documentation that has meaning to the users, time may be wasted dealing with technical problems by duplicating answers to problems that have already been solved.Other reasons for creating accurate, complete technical documentation include to:. pass an audit, or quality certification . create an accurate record of an organisation’s systems. record maintenance . identify the need to upgrade systems . provide records for future decisions . provide workers and stakeholders with a database for their jobs . ensure work and service quality is consistent when staff changes occur . add value to the organisation’s business and service. Technical documentation provides a record of the functionality and processing of a system, program, network or application. The technical documentation should document how the system, program, network or application is structured, how it works and changes that have been made to it.Task 1: Determine documentation standardsQ: Make a list of ten objects that you can see or feel from where you sit, that have technical documentation associated with them.Q: Make a list of ten objects that you can see or feel from where you sit, that have technical documentation associated with them.A: Answers for this question will vary, there are some example following:1-When you switched on your computer, a technical document (a log in the computer’s memory) was created. 2-The software you are using was installed using technical documentation. 3-When you switch on your lights, a record is kept for billing purposes. 4-The chair you sit on was made from a plan. 5-The mobile phone on your desk has a help function. 6-When the chair was made, a quality check was recorded. 7-The air you breathe is monitored for pollution records. 8-The time on the clock is set to an agreed, international standard. 9-The clothes you wear were made to a pattern. 10Your health is recorded in doctor’s files.Activity 2: Identify documentation standardsQ: Identify at least two industry standards that relate to documentation. Use search terms such as: standards, documentation, technical, industry in your preferred search engine.A: International Standards Organisation ISO 9000 Quality Standards (which is a family of different standards) that requires the processes involved in technical documentation to meet a certain level of quality, theses standards concern quality management systems. The Australian Standard AS ISO 10013-2003 relates to the documentation for the quality management system. ISO 14000 standards relate to environmental aspects of processes and can relate to such things as disposal and storage of documents and the media chosen for publishing documents. The ISO 9000 and ISO 14000 families of standards are those from which many organisation-based standards are derived.There are many standards that can apply to software used by documentation and used in the delivery of documentation. Two groups of specific standards that relate to the design and production of technical documentation are the Australian Standards for Editing Practice produced by the Institute of Professional Editors (IPed), formerly the Council of Australian Societies of Editors (CASE), and the World Wide Web Consortium (W3C) onscreen accessibility guidelines. You may have found others that relate more specifically to your own study or work area.Task 2: Determine technical documentation requirements Activity 1: Documentation for programsNote the following scenarioYour organisation’s software development team has been complying with all the documentation requirements for the development of new programs, except for one issue.The comments in their code, telling others what they’re trying to do with their program are random, cryptic, and inconsistent.You are asked to write specifications for comments in programs. The conventions should apply to any of the languages used by the programmers for the organisation. The constraints and rules imposed on programs should be as simple as possible.Q: What are some specifications that could be used for commenting within a program? Interview someone working in software programming or search the web for some sample specificationsA: The specifications for comments within the code could include that:.an overall comment should be included at the start of the program to identify the . framework of the program or changes to the program . comments should be used to describe the code that is not apparent . all comments should be preceded by a blank line. arguments should be commented if they are not clear. comments should be aligned with the code.Activity 2: Documentation requirementsQ: Think about the last time you purchased something that required installation or that you had to put together yourself. Did it come with instructions? Were the instructions complete, comprehensive, useful, coherent, accurate, accessible and clear? Did they help you or did you not refer to them at all?A: The answer is depending on the product that i have bougth, if that product was the thing i have been used before. I am ever read or look at the instructions. However, if the product is come with the new technology or i never been use it for long time or that product is quite expensive. I might read through very quick to get some useful information.Activity 3: The pros and cons of paperQ: There are probably times when you would use one medium in preference to another. What do you think are the advantages and disadvantages of paper-based documentation as a means of learning about a program or a system?A: Some of the advantages of paper-based documentation include:.most people feel comfortable with books—they can write notes in them and they can .read them without a computer .they have the benefit of using the actual software while following the manual . paper as a physical medium is easily handled by the user .novice users, or those who are not computer literate may not be able to use on-line help .paper-based documentation allows the user to add in their notes and bookmarks .manuals can be modular to target the needs of various user groups .paper-based documentation is portable, and production costs are less when compared to some other forms of digital media (DVDs etc) .paper can sometimes offer greater detail than other media. Some of the disadvantages of paper-based documentation include:paper deteriorates physically over time with use a manual is more difficult to update and provide flexible access methods it can not include sound or animation the physical size of a manual can be intimidating, which can put people off paper documentation must be massive to be able to cater for all the user needs, but individual users will usually only use parts of it it may cause the user to shift concentration from what they are doing to the manual.Activity 4: The pros and cons of digital mediaQ: What do you think are the advantages and disadvantages of digital or computer-based documentation (other than video) as a means of learning about a program or a system?A: The advantages of computer-based documentation include that:.it can be flexible, provide vast amounts of information, and can integrate sound, text and animation .it can be context-sensitive, providing help directly relevant to the function being used or to the task .it is of great value in training and in advanced help features, like wizards and cue cards .it is easy to update and revise, efficient to store, and cheap to distribute .it can allow interaction no paper is needed .it has cheaper packaging (CDs) immediate reference is possible (you don’t have to search for the manual).The disadvantages of computer-based documentation include that:it requires computer literacy it often requires various plug ins to access files the computer screen places limitations on use it may require swapping from the task to the documentation, causing distraction from the task at hand as video it can take up large amounts of memory and be cumbersome to download. Activity 5: The pros and cons of videoQ: Describe some and advantages and disadvantages of using video-based documentation to learn about a program or system?A: The advantages of video-based documentation include that:.it can provide a rehearsed and thorough demonstration or walk-through of a software application .it best suited for presenting animation, sound, graphics and ‘real-life’ presentations .it is good for training and promotion .learner retention is generally higher than for printed media (it is generally more engaging) .suitable for groups as well as individuals .DVDs are inexpensive and easy to distribute (although development costs may be high) no paper is needed. The disadvantages of video-based documentation include that: video requires specialist equipment and personnel to produce; the cost may be high for complex, multimedia material sequential access—while video is good for demonstrating sequential tasks, it is unsuitable for random access tasks as found for example in reference guides .it is non-interactive and does not cater for different levels of users .it can be easy to pirate .it is expensive to update—a new video must be produced (rather than a new version of a paper of digital print resource) documentation is less detailed if reliant on video only.
ICAD4043B Develop and Present Feasibility Report
ICAD4043A Develop and present a feasibility report
Assessment informationWelcome to the unit Develop and present a feasibility report (ICAD4043A). This unit is about researching and presenting a range of feasible scenarios or solutions for a client's business problem.In this unit, you’ll do 5 tasks for a fictional manufacturer of small electrical appliances, NewElectrix. These tasks will allow you to demonstrate your skills and knowledge in Developing and presenting a feasibility report.To do these tasks you’ll need to be able to:.Analyse data and document client requirements .Identify alternative solutions .Examine alternative solutions against project constraints .Develop and document a feasibility report .Obtain client sign off on documentation Task 1: Create a requirements documentActivity 1.1: Data flow diagram
Assessment informationWelcome to the unit Develop and present a feasibility report (ICAD4043A). This unit is about researching and presenting a range of feasible scenarios or solutions for a client's business problem.In this unit, you’ll do 5 tasks for a fictional manufacturer of small electrical appliances, NewElectrix. These tasks will allow you to demonstrate your skills and knowledge in Developing and presenting a feasibility report.To do these tasks you’ll need to be able to:.Analyse data and document client requirements .Identify alternative solutions .Examine alternative solutions against project constraints .Develop and document a feasibility report .Obtain client sign off on documentation Task 1: Create a requirements documentActivity 1.1: Data flow diagram
ICAB4225A Automate Processes



ICAB4225A Automate Processes
Welcome to the Automate Processes (ICAB4225A) blog. This blog will help you understand about programming.Assessment informationTo successfully complete this unit, Automate processes (ICAB4225A) this blog will be shown about automate solutions by using basic scripting processes and application-specific scripting options.Automating processes is an integral part of contemporary computing; using inbuilt scripting languages is a key part of that. Applications or systems administration personnel need to continually examine options to automate processes, to that way enhance performance.To successfully complete this unit, this blog will shown how to design and develop algorithms.Also need to be able to develop an algorithmic statement of a solution for a set process.Assessment tasks will require you to show you are able to:.Develop algorithms to represent solution to a given problem .Describe structures of algorithms .Design and write script .Verify and review script .Document scriptTask 1: Identify algorithm structuresUsing a web browser, go to the Q-Skills website at: http://www.q-skills.com/flowchrt.html. Look at ISO9004.4. Section A.6.2 which describes four basic symbols to be used in flow charts.Activity 1.2: Write an algorithm demonstrating sequenceQ: Write an algorithm that will accept two numbers, add them together, multiply by 27 to the total and then display the totalA: This figure is an algorithm that accept and add two number together, then multiply by 27 to the totlal and display the total.Q: What are the four basic flowchart symbols and what do they represent?A: Following table is shown the basic flow chart symbols and they represent.Activity 1.3: Write an algorithm demonstrating selectionWrite an algorithm that will accept a test mark between 0 and 100. Display the grade that the student receives based on the table below:A: The below ficgure shows an algorithm to accept a test mark between 0 and 100 and also display the grade that the student will receives.Task 2: Apply algorithm structure to give a solutionActivity 2.1: Create an abstract designQ: Write an algorithm to process the pay information for employees according to the following:.To process each pay, the operator will input the hours worked and the pay rate. .Tax of 30% is to be deducted from the gross pay. .The information to be displayed is the gross pay, tax deducted and the net pay (gross pay minus tax). .After processing each pay, the operator will be prompted to process another pay. .Ifthe operator types in the character ‘y’ (uppercase or lowercase), another pay is to be processed. Any other response to this prompt will end the program. A: This is one of the possible solution. Activity 2.2: Review abstract designDesign a set of inputs that could be used to conduct desk-checking of the algorithm below. The test data should test program flow control, correctness of calculations and assignments to variables. The algorithm should meet the program specifications presented in Activity 1.Q: Perform a desk-check on the algorithm using your test inputs. Does the algorithm meet the program specifications? If not, what errors did you identify?A: According to the algorithm in 2.1 answer, This algorithm does not meet program specifications because of two problems:.Problem 1 — The gross pay is displayed twice and the net pay is not displayed..Problem 2 — If the operator responded with uppercase Y when prompted to process another pay, the algorithm stopsThe IF and the ELSEIF both test for the lowercase ‘y’. One of them should test for uppercase ‘Y’.Activity 3.2: Identify and correct a logic errorTask 3: Develop and verify script language for an algorithmActivity 3.1: Translate an algorithm to script codeTranslate the following algorithm into script code using Python. Execute your script with the numbers 3 and 5.Q: Find and correct the logic error(s) in the script.A: There are 3 logic error followed:Logic error 1: In the while loop, the else should not change the loop control variable (gotConvertTo) to 1. This allows any character to be entered from the keyboard and the script continues. This line should be deleted.Logic error 2: This is more like a ‘copy and paste’ error. The code executes as it should, but the output would be misleading. The print statement in the section where the original temperature is converted to Celsius (the last if), should read Fahrenheit where it reads Celsius. It should be:if convertTo == 'c':newTemp = temp—32 * 5/9print 'Original temperature entered was',temp,'Fahrenheit'Logic error 3: The mathematical formula to convert to Celsius requires that 32 be subtracted from the temperature BEFORE the multiply and divide. The code should enforce a change in the order in which the calculations would be performed to allow the addition to occur first. The addition part should be in parentheses to force the addition to occur fist as shownnewTemp = (temp—32) * 5/9Key termsAlgorithm: A procedure or set of steps to accomplish a specific taskComputer program: The embodiment of an algorithm in a computer language, so that it can be executed on a computerSequence: The simplest type of flow in algorithm design, where actions are carried out in the stated order; see also ‘selection’ and ‘iteration’Selection: A flow-pattern in algorithm design, where a choice is made about which action to perform, depending upon a logical condition; the most common selection structure is IF/ELSE; see also ‘sequence’ and ‘iteration’Iteration: a flow-pattern in algorithm design, also known as looping or repetition; actions are performed over and over again; a loop condition determines when the loop will finish; see also ‘sequence’ and ‘selection’Pseudocode: A language-neutral representation used to show the logic, structure, and calculations of algorithmsVariable: A container with a name, to hold values during program execution; when a variable is declared in a program, some memory is set aside to hold its valueSoftware development life cycle (SDLC): A procedural framework for developing computer software and information systemsTop-down design: The development of a program by dividing the original complex task into smaller, less complex tasks, and then applying the same process to each smaller task, until the tasks translate easily into code statementsDesk-check: A code testing process where the code is manually executedWalk-through: A review of requirements, designs and or code by a group; its purpose is to analyse the programmer’s logic and assumptionsFunction:A named section of code that performs a particular taskArray: A collection of data items that can be accessed using a common name and an index
Welcome to the Automate Processes (ICAB4225A) blog. This blog will help you understand about programming.Assessment informationTo successfully complete this unit, Automate processes (ICAB4225A) this blog will be shown about automate solutions by using basic scripting processes and application-specific scripting options.Automating processes is an integral part of contemporary computing; using inbuilt scripting languages is a key part of that. Applications or systems administration personnel need to continually examine options to automate processes, to that way enhance performance.To successfully complete this unit, this blog will shown how to design and develop algorithms.Also need to be able to develop an algorithmic statement of a solution for a set process.Assessment tasks will require you to show you are able to:.Develop algorithms to represent solution to a given problem .Describe structures of algorithms .Design and write script .Verify and review script .Document scriptTask 1: Identify algorithm structuresUsing a web browser, go to the Q-Skills website at: http://www.q-skills.com/flowchrt.html. Look at ISO9004.4. Section A.6.2 which describes four basic symbols to be used in flow charts.Activity 1.2: Write an algorithm demonstrating sequenceQ: Write an algorithm that will accept two numbers, add them together, multiply by 27 to the total and then display the totalA: This figure is an algorithm that accept and add two number together, then multiply by 27 to the totlal and display the total.Q: What are the four basic flowchart symbols and what do they represent?A: Following table is shown the basic flow chart symbols and they represent.Activity 1.3: Write an algorithm demonstrating selectionWrite an algorithm that will accept a test mark between 0 and 100. Display the grade that the student receives based on the table below:A: The below ficgure shows an algorithm to accept a test mark between 0 and 100 and also display the grade that the student will receives.Task 2: Apply algorithm structure to give a solutionActivity 2.1: Create an abstract designQ: Write an algorithm to process the pay information for employees according to the following:.To process each pay, the operator will input the hours worked and the pay rate. .Tax of 30% is to be deducted from the gross pay. .The information to be displayed is the gross pay, tax deducted and the net pay (gross pay minus tax). .After processing each pay, the operator will be prompted to process another pay. .Ifthe operator types in the character ‘y’ (uppercase or lowercase), another pay is to be processed. Any other response to this prompt will end the program. A: This is one of the possible solution. Activity 2.2: Review abstract designDesign a set of inputs that could be used to conduct desk-checking of the algorithm below. The test data should test program flow control, correctness of calculations and assignments to variables. The algorithm should meet the program specifications presented in Activity 1.Q: Perform a desk-check on the algorithm using your test inputs. Does the algorithm meet the program specifications? If not, what errors did you identify?A: According to the algorithm in 2.1 answer, This algorithm does not meet program specifications because of two problems:.Problem 1 — The gross pay is displayed twice and the net pay is not displayed..Problem 2 — If the operator responded with uppercase Y when prompted to process another pay, the algorithm stopsThe IF and the ELSEIF both test for the lowercase ‘y’. One of them should test for uppercase ‘Y’.Activity 3.2: Identify and correct a logic errorTask 3: Develop and verify script language for an algorithmActivity 3.1: Translate an algorithm to script codeTranslate the following algorithm into script code using Python. Execute your script with the numbers 3 and 5.Q: Find and correct the logic error(s) in the script.A: There are 3 logic error followed:Logic error 1: In the while loop, the else should not change the loop control variable (gotConvertTo) to 1. This allows any character to be entered from the keyboard and the script continues. This line should be deleted.Logic error 2: This is more like a ‘copy and paste’ error. The code executes as it should, but the output would be misleading. The print statement in the section where the original temperature is converted to Celsius (the last if), should read Fahrenheit where it reads Celsius. It should be:if convertTo == 'c':newTemp = temp—32 * 5/9print 'Original temperature entered was',temp,'Fahrenheit'Logic error 3: The mathematical formula to convert to Celsius requires that 32 be subtracted from the temperature BEFORE the multiply and divide. The code should enforce a change in the order in which the calculations would be performed to allow the addition to occur first. The addition part should be in parentheses to force the addition to occur fist as shownnewTemp = (temp—32) * 5/9Key termsAlgorithm: A procedure or set of steps to accomplish a specific taskComputer program: The embodiment of an algorithm in a computer language, so that it can be executed on a computerSequence: The simplest type of flow in algorithm design, where actions are carried out in the stated order; see also ‘selection’ and ‘iteration’Selection: A flow-pattern in algorithm design, where a choice is made about which action to perform, depending upon a logical condition; the most common selection structure is IF/ELSE; see also ‘sequence’ and ‘iteration’Iteration: a flow-pattern in algorithm design, also known as looping or repetition; actions are performed over and over again; a loop condition determines when the loop will finish; see also ‘sequence’ and ‘selection’Pseudocode: A language-neutral representation used to show the logic, structure, and calculations of algorithmsVariable: A container with a name, to hold values during program execution; when a variable is declared in a program, some memory is set aside to hold its valueSoftware development life cycle (SDLC): A procedural framework for developing computer software and information systemsTop-down design: The development of a program by dividing the original complex task into smaller, less complex tasks, and then applying the same process to each smaller task, until the tasks translate easily into code statementsDesk-check: A code testing process where the code is manually executedWalk-through: A review of requirements, designs and or code by a group; its purpose is to analyse the programmer’s logic and assumptionsFunction:A named section of code that performs a particular taskArray: A collection of data items that can be accessed using a common name and an index
Subscribe to:
Posts (Atom)