Tuesday, January 8, 2019
Database Development Essay
AbstractThis radical defines the Softw ar growing Life rhythm microscope stages specifically the waterfall mode with a check of tasks to ameliorate the prime(a) of selective informationsets throughout the cycle. It intromits recommendations of actions to be performed for full optimization for enhancing military operation from entropy quality assessment. Although full optimization may be r each(prenominal)ed throughout the transition of SDLC, go along maintenance must be in sued to properly retain the database error-free and protected. An military rating of three methods and activities to ensure maintenance planning is implemented is discussed. An in-depth analysis of an efficient method for planning concurrency wangle methods and volute granularities that ar ready(prenominal) to use that volition denigrate potential security risks that may occur. Finally, serializ capability closing off model is introduced that ensures transactions generate little record-leve l locking while operational the g everyplacening body and how a verification method countenances review of proper inputs and error checks to maturation soundbox. fundamentThere be several package increase Life cycle per second methods that are availabel to utilize although, the Waterfall SDLC is the most preferable due to the simplicity and straight forrad methods utilized and will be discussed in regards to topics in this paper. The benefits of this model type take on departmentalization and manegerial control. A schedule give notice be set for each phase withal to a how a factory dodging works from one step to the adjacent in a proceeding bearing until the yield is complete. However, once in the examination phase it is difficult to revert tush to make any additional changes. (SDLC Models., n.d.).Tasks to correct informationset Quality Using SDLC MethodologyThe Waterfall SDLC incorparates the following stages of planning and kill software, requirements spe cification, spirit, implementation, interrogation and maintenance. The requirements phase of the SDLC is to ensure clearly define requirements via all parties involved in the dishes. Deliverables in this stage let in requirements documents that incorporates descriptions of requirements, diagrams and references to necessary livelihood as well as Requirements Tracability ground substance (RTM), this displays the manner in which products being spicyly- authentic will interact and correlate to anterior components that have already been developed. This phase prepares datasets rightfulness success throughout the SDLC do by when requirements are properly delimit. (The software program Development Cycle (SDLC)., n.d.).The design phase lists software features in detail with psuedocode, entity-relationship model(s) (ERM), hierarchy diagrams, layout hierarchy, tables of business rules, a full data dictionary, and business branch diagrams. This phase transforms the requirements int o governance design specifications. In this phase it is imporatant to review software and computer hardware specifications and schema architecture. This will create the bottom for the implementation phase. Lastly, the implementation phase begins the cryptograph process in which portions of programs are developed and tested. Clearly defined requirements are defined via use-case scenario that enables context based definitions and a visualisation of the completed product for clarifications, accuracy, and completeness of requirement request. (SDLC Models., n.d.).Actions to perfect Record Selections and Improve selective informationbase PerformanceActions to optimize record selection and remediate database death penalty include automated controls that can be applied in the design phase of SDLC. The design phase specifically it is big for developers to set proper automated controls such(prenominal) as input, processing, and output controls to enhance honor, security, and o pineability of the system and datasets. Input controls such as completeness checks and duplication checks ensure blank palm and duplicate information is not entered into the data sets. Automating process controls to ensure systems correctly process and record information. (FFIEC IT interrogative sentence enchiridion InfoBase introduction Phase., n.d.). Quality management techniques that improve quality assessments include error detection, process control, and process design. These processes detect missing values, improve take place errors, and help optimize effeciency. (Even, A., & international type Aere Shankaranarayanan, G., 2009). leash Maintenance Plans and Three Activities to Improve Data QualityThree types of maintenance plans include preventative, nonindulgent, and adaptive maintenance which improve the data quality. Activities to improve data quality include database backups, integrity checks, optimizing the index. Preventative maintenance incorporates creating and f orever maintaining daily and/or weekly backups for data loss prevention, corrective maintenance ensures system errors are corrected. One activity associated to corrective maintenance includes resolving deadlocks, which occurs when two or more tasks permanently block each other. Adaptive maintenance includes enhancing system and database achievement via based on utility assessments and optimized queries to improve performance. (Coronel, Morris, & adenylic acid Rob., 2013).Methods for Planning Proactive Concurrency ascendency and affiance large-grainedityConcurrency issues revolve near conflicts that occur when simultaneous tasks are performed on multiple systems, the conflict may practise inconsistencies. The goal of concurrent controls is to establish reproducible throughput and accurate from results in concurrent operations. Granular locking schemes enable locking pages, tables, rows, and cells. subsequently reviewing Process-centered check over of Object Oriented comput er software Development Methodologies, the methodologies mentioned were outside of the scope of concurrency and lock coarseness. However, there are two methods, high granularity approach and low granularity approach that will enable a distributed database with consistency. High granularity offers maximum concurrency although requires more overhead versus low granularity which offers nominal overhead although reduces concurrency. Additional overhead in the form of locking granularly at unlike object-oriented hierarchy levels helps create proactive concurrency control within the system. This provides additional security via the ability to control which users are modifying the database at the selfsame(prenominal) time. (Ellis, R., n.d.).System Analysis to Ensure Tractions do not Record-Level Lock Database in operating theatreIn multiuser database transactions that are executing simultaneously must have legitimate results, it is vital to have control over concurrency and consis tency. To enable processes that provide this control a transaction isolation model named, serializability is available for use. This model gives the illusion that transactions lean one at a time. The multiversion consistency model provides multiple users with a bring out view of the data concurrently, which prevents record-level locking from affecting the database. (Data Concurrency and Consistency., n.d.). Once updates are commited to the system verifyoption can be utilized to ensure the integrity of data entered will enhance system effectiveness. (SqlCeEngine.Verify Method (VerifyOption) (System.Data.SqlServerCe)., n.d).ConclusionIn goal material discussed includes an analysis specific tasks that will improve the quality of datasets within a database. A review of the Software Development Life Cycle (SDLC) and more specifically the Waterfall methodology SDLC. Recommended actions in the design phase that will enhance the optimization of record selection are considered on with t hree maintenance plan options and activities to improve the quality of data within the database. Serializability isolation model ensures transactions that will produce less record-level locking while operating the system and verification methods will allow for review of proper inputs and error checks to increase consistency. Overall, research shows that multiuser distributed databases utility will depend on specific functions created from the origination of the product in the SDLC to the finished product and continued maintenance for consistent and efficient performance.ReferencesData Concurrency and Consistency. (n.d.). Oracle Documentation. Retrieved family 12, 2013, from http//docs.oracle.com/cd/B10500_01/server.920/a96524/c21cnsis.htm Even, A., & angstrom unit Shankaranarayanan, G. (2009). Quality in Customer Databases-Centered Review of Object Oriented Software Development Methodologies. ACM Computer Database, 15, 3,4,5. Retrieved family 12, 2013, from the ACM Computer data base. Ellis, R. (n.d.). Lock Granularity. Granularity of Locks_and Degrees of Consistency_in a Shared Database. Retrieved September 12, 2013, from www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=9&sqi=2&ved=0CF8QFjAI&url=http%3A%2F%2Fpages.cs.wisc.edu%2Fnil%2F764%2FTrans%2FGranularity.ppt&ei=kQ8yUqOhPIzl4AOM6oDIDw&usg=AFQjCNEdfijo3XG83N7W2WlglSi3cEJsQQ&sig2=WGLffPJ8amqYRjHXJAHLuQ&bvm=bv.52109 FFIEC IT Examination Handbook InfoBase Design Phase. (n.d.). FFIEC IT Examination Handbook InfoBase Welcome. Retrieved September 12, 2013, from http//ithandbook.ffiec.gov/it-booklets/development-and-acquisition/development-procedures/systems-development-life-cycle/design-phase.aspx Rob, P., & Coronel, C. (2002). Database systems design, implementation, and management (5th ed.). Boston, MA Course Technology. SDLC Models. (n.d.). One Stop QA. Retrieved September 12, 2013, from www.onestopqa.com/resources/SDLC%20Models.pdf SqlCeEngine.Verify Method (V erifyOption) (System.Data.SqlServerCe). (n.d.). MSDN the Microsoft Developer Network. Retrieved September 12, 2013, from http//msdn.microsoft.com/en-us/library/cc835509%28v=vs.100%29.aspx The Software Development Cycle (SDLC). (n.d.). Pelican Engineering. Retrieved September 13, 2013, from www.pelicaneng.com/DevDocs/sdlc.pdf
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment