Professional Documents
Culture Documents
Moore’s Law
Is this true?
The gap between what the processor could do and what it actually does do
The processor is faster than the memory and every now and then it must
wait
Figure 8-1
If space is needed in cache, then system must write cache to main memory before
fetching new data, causing a wait time for processor
If another processor is writing to memory first, then it may cause more delay
The wait time adds up and can create problems or time out, but most importantly wasted
cycles!
1) Faster Processor
If the amount of memory needed for the application is more than what is available
in cache, the cache memory will continually be recycled
Saving data values to main memory from cache and reloading a new set of values
Two processes attempting to use the same piece of data at the same time
Only one process can hold the lock on a piece of data at a time
Reduce the number of I/O’s
I/O’s can fill cache with data that is not reused and therefore is a waste of memory
use
Building messages and handling network protocol also ‘tax’ the system
Transaction Processing
Figure 8-3
Figure 8-4
Spreading the load will optimize the load, but will require software and hardware
to do it
Figure 8-5
Use a transaction monitor to assist in sharing programs and resources among all
of the connected terminals
Two-Phase Commit
When you update two or more databases on different systems, there are additional
network messages and disk writes
Figure 8-6
Source of delays exist when sub-transactions are initiated and a log is written on
subsystem
Locks can be held longer and potential timeouts can occur or lock contentions
You must set a schedule to empty the queue or start other systems to keep it
efficient
Figure 8-7
Batch
3) Optimization
Batch Problems
Ran at night
Load Balancing
Figure 8-7
4 Tiers
Web Browsers
Web Servers
Transaction Servers
Database Servers
Load Balancing
This requires special network router that allows the external connections to
connect at 1 point (IP/Web address)
The network router then spreads the connections among the web servers
Also must ensure the data in all of the web servers is the same
Data Access
Data Marts
Data Warehouse
Decision Support
Ad Hoc Queries
I/O Intensive!
Causes:
Sorting
Parsing the query, building a processing plan, and optimizing the plan
Ad Hoc Queries
Is network intensive
Data Replication
Allow ‘back-up’ to get behind during work hours and catch up overnight
Backup copies should be made more frequently for large databases, so less to
reconstruct
Figure 8-8
Packet loss
Distance to travel
Network congestion
You can get an estimate of the overall performance but no real measurement
1. Administration
2. Operation
3. Fault tracking and resolution
1. Administration
2. Operation
Backups
Detecting faults
Maintenance
Define critical
Operations Group
Monitors systems
Which is simpler?
Managed Object – contains the Monitor and Control element in the form of an Agent
Rules Engine
A filtering agent that only lets the necessary information flow through to the
database for processing
Autonomic Management
Allow systems to be self-healing, detecting and correcting problems
Chapter 10 & 11
Chapter 10 - Security
Authentication
Access Control
Protection
Security Management
Authentication
Access Control
AKA…Authorization
Any examples?
Protection
Can be divided among any number of categories to review for proper protection
Protection Continued…
Security Management
Automated reporting?
Manual reporting?
Easier to manage
Manager Roles
Running Reports
Assigning Roles
If Data is Duplicated…
You do not want to deny access on one system and open it up on another
Auditing
Logging
Require Multiple-Authentication
A Layered Approach
To access inner core layers, authentication must occur from each outer
layer
Access Points
Firewalls
Middleware
Custom code
Authenticating Server
Must be kept current with patches/updates to combat the most current threats
Location Security
Messages of a certain kind are restricted from coming from only a particular
location
Multiple Security Management regimes being used to different parts of the system
Single Sign-On
User logs on once and is granted access to everything using single sign-on
software
Confidence in security?
Is it secure?
Is it consistent?
Should it be implemented?
Opens a session using encryption keys that are sent with messages
Userid / password software can also be used with SSL to enhance security
Logon is performed
Security Tokens
WS-Trust Standard
Web Service uses token received and contacts Security Token Service to validate
the token
Implementation Planning
Use a network diagram and overlay security
Access Control
I say Up-Front!
Waterfall Development?
RAD?
Waterfall Development
End users and the business do not know the requirements, so how do they know it
is right?
Difficult to express the design to programmer and sponsor in a clear manner
Iterative Development
Business Rules
Define the structure of these facts and how they are processed
5 rule patterns
Existing Systems
2 Classes of Programmers
Reuse of Components
Serendipitous Reuse
Architectural Reuse
Define the interfaces and look for components to implement the interfaces
Architectural Reuse
Screen layouts
Design patterns
Documentation
Testing routines
Faster Development
Cost Reduction
Levels of Design
Outside of IT
Understand
Brainstorm
Clarify
Analysis
Levels of Design
IT
Gather Requirements
Design Solution
Implement Solution
Levels of Design
IT
Define Tasks