Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Open Database Connectivity wikipedia , lookup
Relational model wikipedia , lookup
Microsoft SQL Server wikipedia , lookup
Microsoft Jet Database Engine wikipedia , lookup
Functional Database Model wikipedia , lookup
Database model wikipedia , lookup
Concurrency control wikipedia , lookup
Slovak University of Technology Faculty of Material Science and Technology in Trnava Information Systems Development Basic architectures. Mainframe architecture. With mainframe software architectures all intelligence is within the central host computer. Users interact with the host through a terminal that captures keystrokes and sends that information to the host. Mainframe software architectures are not tied to a hardware platform. User interaction can be done using PCs and UNIX workstations. A limitation of architectures is that do not easily support graphical user interfaces or access to multiple databases . Basic architectures. File sharing architecture. The original PC networks were based on file sharing architectures. The server downloads files from the shared location to PC. The requested user job is then run in the desktop environment. File sharing architectures work if shared usage is low, update contention is low, and the volume of data to be transferred is low. In the 1990s, PC LAN computing changed because the capacity of the file sharing was strained as the number of online user grew and graphical user interfaces (GUIs) became popular. PCs are now being used in client/server architectures Basic architectures. Client – Server architecture. Main idea: data should be a processed in the place where they are stored Advantages: restriction of data flow along the net restriction of data redundancy preservation of multi-user access Base principle: dividing of powers between two processes, that works independent Client – Server architecture. Client process (front-end) process, which run on user Personal Computers main task is sending user requirements to database server and present adequate results. process has no access to database, serves only as a intermediator server returns to client only a data, that are absolutely useful for next processing. Server process (back-end) process, which provide all database operations process can run on the same personal computer where runs a process of client Process of server is also responsible for keeping of consistency, data integrity and authorization of connecting users Advantages: on the server site Types of services PRESENTATION RULES: controls displaying of user information ( for example displaying of results, menu, screen shots). BUSINESS RULES (Logic): ensures application logic, operations which realize application algorithms. DATA RULES : ensures manipulations with data in database - (SELECT, UPDATE…, and transactional processing, ...) FILES RULES : I/O operations Two tier architectures. The user system is located in the user's PC environment and the DBMS are usually in a server that is a more powerful machine that services many clients. Processing management is split between the user system interface environment and the database management server environment. The database management server provides stored procedures and triggers. TWO–TIER model DATABASE SERVER MIDDLEWARE CLIENT CLIENT CLIENT Variants of Two-tier architecture Client-heavy In client-heavy model the presentation rules and business rules are on client side and data rules are on relational database on server side. It means the majority of processing is moved to client side. Variants of Two-tier architecture Server heavy In server-heavy model are business rules partially moved to server side and presentation rules are staying on clients PC. Data rules, same as client-heavy, are located on server side. Two tier – server heavy Client Server Database Prezentation rules Busines rules Busines rules Data rules File rules Three–Tier architectures In the three tier architecture, a middle tier was added between the user system interface client environment and the database management server environment. There are a variety of ways of implementing this middle tier. Three tier with an application server. The three tier application server architecture allocates the main body of an application to run on a shared host rather than in the user system interface client environment. The application server does not drive the GUIs; rather it shares business logic, computations, and a data retrieval engine. Advantages are that with less software on the client there is less security to worry about, applications are more scalable, and support and installation costs are less on a single server. Three tier with an application server. DATABASE SERVER MIDDLEWARE APPLICATION SERVER MIDDLEWARE CLIENT CLIENT CLIENT Three tier with an application server. Client Application server DB server Database Prezentation rules Busines rules Data rules File rules Distributed database systems. Distributed database systems combine two technologies: Databases Communication Distributed processing – application works on one processor and database works on another processor. Distributed database is decomposed on several personal computers with independent processors, but from user point of view there is only one complex database. There are three ways to distribute data: I. Fragmentation. Different locations store different parts of the database. Horizontal fragmentation stores different records on different servers. Vertical fragmentation stores different fields on different servers. This is good for when different sites need different data but must still access data elsewhere. II. Downloading. A location will take a snapshot of the database parts it needs and work off of that. This is good for times when the same data must be local at different sites but does not change often. III. Replication. A location will keep a replicated copy of the database parts it needs and work off of that. Replication ensures that all replicates automatically and immediately update all other replicates of the same part. This is good for times when the same data must be local at different sites and stay current. Replications. Replaication provides to users local actualized copy of data, that could be added to original data. It allows cheaper access to distributed continuos data processing. The place from where are inicialized changes is called – publisher. The place which receive changed replicated databse is - subscriber. Replications. place 1 place 2 primary copy replica place 3 replica replica place 4 place 1 place 2 replica replica replica replica place 3 place 4 There exists some rules for distributed databases: A. Local autonomy. Each server in the distributed database should be independent and have control of its data. B. No reliance on a central site. A distributed database should not rely on a single site for its operation. C. Continuous operation. The entire distributed database should not have to shutdown for maintenance. D. Location transparency and location independence. User on the distributed database should not concern itself with the location of data it needs. E. Fragmentation independence. An application or user on the distributed database should not concern itself if a table becomes fragmented over several servers. F. Replication independence. An application or user on the distributed database should not concern itself with the replication of data. G. Distributed query processing. Each server in the distributed database should be aware of how data is distributed for querying purposes. H. Distributed transaction management. A distributed database should be able to handle transactions involving multiple servers. I. Hardware independence. It should not matter what hardware is used for servers on the distributed database. J. Operating system independence. It should not matter what operating system is used for servers on the distributed database. K. Network independence. It should not matter what network protocols are used on the distributed database. L. DBMS independence. It should not matter what DataBase Management Systems are running on each server in the distributed database. Classification of information demands 1. Operational level - Here is a needs for every days system operations (accounting, store, orders, invoices, salary, ...) - Applications works through the „ad hoc“ transactions. - Processing is called OLTP – On-Line Transaction Processing - Databases on this level are called operational Classification of information demands 2. Dispositional level - This level is superset to operational level - database contains additionally also time horizon, various accumulations and aggregations - Serve for management decision and planning - Processing on this level is called OLAP – On-Line Analytical Processing - Users only read data on this level ! Classification of IS A. - Transaction Processing Systems - TPS - Transaction Processing System (TPS) is a type of information systems. TPS collect, store, modify, and retrieve the transactions of an organization. - A transaction is an event that generates or modifies data that is eventually stored in an information system. Classification of IS Features of Transaction Processing Systems: Rapid Response Fast performance with a rapid response time is critical. Businesses cannot afford to have customers waiting for a TPS to respond. Reliability Many organisations rely heavily on their TPS; a breakdown will disrupt operations or even stop the business. Inflexibility A TPS wants every transaction to be processed in the same way regardless of the user, the customer or the time for day. Controlled processing The processing in a TPS must support an organisation's operations. Classification of IS B. - Management Information Systems - MIS - The main task is deliver various reports and aggregated arrangements according to different time, space and other point of view. - Input information are data from transactional systems. - Management Information Systems incorporate between ERP - Enterprise Resource Planning. Classification of IS C. – Decision-Support Systems - DSS - Decision-Support Systems are extension to MIS. - DSS serves for various analysis and their using in the decision process. - Above data there works a lot of DSS tools : software for data analysis , reports generator which are optimized for quick decision in the time and many visualization tools. Classification of IS D.– Executive Information Systems – EIS - Executive Information Systems roof all previous. - EIS serves for obtaining of strategic decision information in financial and personal area. - New term is Business Intelligence, - here is included MIS, DSS and also EIS. - EIS and DSS in early versions is possible to consider for predecesor Data Warehouse and OLAP. DW + OLAP Top management Middle level management DSS EIS Dispositional level Marketing MIS Operation Operational OLTP level Information systems security. Attacks IS Attacks weak places Attacks Information systems security. Methods to achieve information systems security: A. EBIOS (Expression of Needs and Identification of Security Objectives) The EBIOS method is used to assess and treat risks relating to information systems security (ISS). It can also be used to communicate this information within the organisation and to partners, and therefore assists in the ISS risk management process. Reference frame EBIOS is composed of a set of tools to discover, train or employ the method, and to contribute to its community development. Information systems security. B. PSSI (Information Systems Security Policy) IS Security Policy reflects the strategic vision of the management team of an organisation such as an SME, industrial group or government agency in the ISS field. The main purpose of this guide is to provide ISS managers with a framework for preparing an information systems security policy in their organisation. Information systems security. The information systems security policy guide is divided into four sections: - the introduction - sets out the role of the information systems security policy in relation to the organisation's standards baseline and describes the basis from which it derives its legitimacy; - the methodology contains a detailed description of the approach for conducting a project to develop an information systems security policy, and gives recommendations for devising security rules; - the security principles baseline; - a list of ISS reference documents (evaluation criteria, statutory texts, standards, codes of ethics, supplementary reports, etc.). Information systems security. C. TDBSSI (Information Systems Security Trend Chart) An ISS trend chart is a management tool used at various levels of decision-making, management, and operations to provide an analytical overview of the security situation, from both a technical and functional viewpoint (showing risk coverage, quality of security policy, follow-up of audits, actions, and alerts, etc.). A trend chart is an essential graphical tool that provides analytical information for use in monitoring all actions involving information systems security. It helps ensure that the strategy defined in the security policy is implemented at management and operational levels, and that all significant information is relayed to decision-makers.