Free Essay

Database Papers

In: Computers and Technology

Submitted By xiaokui008
Words 941
Pages 4
xxxxx大学研究生开题报告

学位级别:□博士 □硕士 Ρ工程硕士 学 号: G2013xxxxxxx 研究生姓名: xxxx 指导教师姓名: xxxxx 专业名称: 信息与服务工程 所在学院: 软件学院 开题报告时间: 2014.03

xxxxx大学研究生部学位办制表
注意:本表基本情况及报告正文由研究生本人填写,硕士不少于3000字,博士不少于5000字。格式要求:正文文字部分为5号宋体、单倍行间距排版,A4纸双面打印装订。
开题报告评价部分分别由指导教师及专家组书写。开题报告会结束后一周之内将报告原件交院(所)研究生教学秘书处。
一、基本情况
|研究生姓名 |xxxxx |学 号 |xxxx |
|院、系 |软件学院 |指导教师姓名及职称 |xxxx |
|学科、专业 |信息与服务工程专业 |入学年月 |2013.03 |
|研究方向、论文选题范围: |
|研究方向:IPv6技术在政府门户网站建设中的应用示范 |
|论文选题范围:网站建设 |
|拟定论文题目: |
|面向CNGI的政府门户网站建设示范设计与实现 |
|论文科研课题属于哪一级科研项目,经费来源及金额(课题来源选项分为国家计委、科委项目、国家经贸委项目、国家自然科学基金项目、国务院其他部门项目、主|
|管部门(部委级)项目、省、市、自治区项目、国际合作项目、学校级项目、自选项目、其它): |
|国家发展改革委员会委托中国下一代互联网示范工程(CNGI)专家委员会组织的网站系统IPv6升级改造项目中的网站建设模块,网站系统IPv6升级改造项目经费共计|
|约2000万,其中,国家拨款1400万元,承担单位自筹600万元。 |
|论文类型(基础研究、应用研究、开发研究、其它) |
|开发研究 |
|摘 |选题研究内容和意义简介(限400字): |
| |政府门户网站是国家重要信息系统,已逐渐成为当前政府推进政务公开、提升行政效率和服务水平,并让企业和公众更广泛地参与公共事务管理的重要手段|
| |。 |
| |为抓住下一代互联网发展的机遇,取得发展的先机,国家发改委主导,科技部、教育部等八部委联合于2003年酝酿并启动了中国下一代互联网示范工程(CNG|
| |I)项目。 |
| |本论文将以开发建设基于IPv6的某部委政府门户网站为例,分析阐述网站开发建设、网站系统升级改造、网络建设及安全防护等方面的重要工作,研究如何|
|要 |使网站在满足CNGI要求,支持IPv6和IPv4的双栈协议,同时满足基于IPv4/IPv6用户访问,保障双栈条件下网站安全的基础上,实现门户网站的对内对外服 |
| |务。 |
| |本研究对国家下一代互联网工程在大型门户网站、国家重要信息系统的应用提供重要经验,将对IPv6的应用推广起到示范作用。 |
|关键词(用分号隔开、最多5个) |政府;网站;下一代互联网;研究;示范 |
报 告 正 文 一、选题依据与研究内容 (一)选题依据(国内外研究现状等) 1、研究意义 政府网站是国家重要信息系统,已经逐渐成为当前政府大力推进政务公开、不断提升行政效率和服务水平并让企业和公众更广泛地参与公共事务管理的重要手段。 科技部的门户网站主要是基于IPv4技术构建的网站系统。在IPv4地址已经枯竭的今天,随着云计算、物联网和移动互联网等技术和应用的发展,IPv6的重要性日益凸显。具有海量地址空间的IPv6将成为全球互联网的纽带。 为了彻底改变我国第一代互联网落后于人的状况,抓住下一代互联网发展的机遇,取得发展的先机,国家发展和改革委员会主导,中国工程院、科技部、教育部、中科院等八部委联合于2003年酝酿并启动了中国下一代互联网示范工程(CNGI)项目。CNGI专家委由工程院牵头,我国下一代互联网由此正式进入了大规模研究及建设阶段。 科技部作为中国信息化建设和发展的重要部门,主动引领政府信息化的发展趋势,积极参与中国下一代互联网示范工程项目建设相关工作。2008年,科技部加入了中科院主持建立的下一代互联网实验网络——CNGI示范网,并获得了相应的IPv6地址。为了充分利用该实验网络,科技部通过部署支持IPv6的网络设备搭建了内部网络,并下连三家事业单位。经过近4年的试运行,科技部已在IPv6网络接入、网络管理等方面积累了一定的经验,为下一步正式连接IPv6互联网奠定了良好的基础。 在CNGI专家委员会的支持下,科技部将对门户网站进行门户网站建设、网站系统升级、网络改造以及安全防护四个方面全面升级改造,以支持IPv4/IPv6的双栈协议,同时在满足基于IPv4/IPv6的用户访问网站的需求上,保障双栈条件下的网站安全。此项目对于IPv6的应用推广将起到很好的示范作用。 2、国内外研究现状 美国因为有较多的IPV4地址,所以对IPV6的态度不是很积极,对IPV6比较重视的主要是一些欧洲和亚洲国家。到2003年鉴于IPV6协议开始走向成熟,并且有了部分商业应用,美国政府对IPV6的态度开始有了变化。欧洲互联网发展的比较早,网络普及率很高,用户增长缓慢,地址压力不大,但考虑到外来新兴业务的潜在需求,同样非常重视IPV6的研究和应用工作。亚洲国家起步晚、人口多,是IPV6最为匮乏的地区,虽然拥有世界上最大的互联网用户群,但又缺乏应有的话语权,所以很多亚洲国家视IPV6为新的机遇。 中国是IPV4地址压力最大的国家之一,所以政府早已对IPV6给予高度重视。从1999年开始,建设NSFCnet,2003年启动中国下一代互联网示范网(CNGI)工程,并确立了“2005年底建设覆盖全国的IPV6网络,2010年建成全球最大规模下一代宽屏网络”的目标,着手建设全国最大的纯IPV6网络。截止2012年6月,中国IPV6地址总量为9413块/32,位于巴西、美国之后,排在第3位。 引入IPV6的原因,一方面是地址资源数量的限制,另一方面是随着电子技术及网络技术的发展,计算机网络将进入人们的日常生活,可能身边的每一样东西都需要连入全球因特网,IPV4地址空间的不足阻碍和限制了互联网的发展。单从数量级上来说,IPv6所拥有的地址容量是IPv4的约8×10^28倍,达到2^128(算上全零的)个。这不但解决了网络地址资源数量的问题,同时也为除电脑外的设备连入互联网在数量限制上扫清了障碍。 作为国家科技部的相关部门,有责任和义务对IPV6的技术进行深入研究,加强国内的网络建设,在工作中解决实际问题。 (二)、选题的研究内容、研究目标以及拟解决的关键问题等 本论文将从政府门户网站建设着手,从门户网站建设、网站系统升级改造、网络改造、网络防护四个方面,分析研究IPv6技术在政府门户网站建设中的示范应用,为面向CNGI的大型门户网站和重要信息系统的应用提供建设和升级改造经验。 研究内容: 政府门户网站主要是为某区域搭建的门户网站,使政府部门行使国家管理的职能时,将繁重的任务简单化,提高办事的效率,接受人民的监督。本课题采用JSP技术开发,采用的数据库为Mysql,具有新闻发布系统、在线投票系统以及在线交流等功能。完成了一个政府网站应该具备的基本功能,即是:网站前台显示模块和网站后台管理模块这两种功能。 前台系统——政府部门网站用户浏览流程: [pic] 访问用户无需进行登录即可查看政府网上的信息内容。浏览机构的概况,用户可以得到该政府部门的简介以及相关成员等内容;浏览政策法规,用户可以在该网页上的分类罗列出的各项法规中,快速地找到想要找到的内容;网上办事,用户可以查阅到近一段时间以来需要民众办理的事情,该网页用来发放一些有关人们的通知;政府新闻,在该网页上分条列出了该区域的大小时事,方便用户阅读,以及了解现在的时事;视频文件,用户可以观看管理员上载的视频资料;政策咨询,在这一块中,人民群众可以给政府工作人员留言,同时也可以查看其他民众的留言。 以上就是前台系统主要完成内容。 后台系统——政府网站管理员管理系统流程: [pic] 对于管理该网站的管理员来说,首先应进行管理员的登录,然后系统自动验证管理员的信息,验证成功后才会进入管理员的界面,在后台系统中,管理人员可以修改、增加、删除网站上的信息。在栏目分类管理页面中显示着一些经常管理的栏目;栏目新闻管理页面中,管理者可以上传新闻,删除新闻;用户咨询管理中可以回复用户提出的疑问,给用户留言和解答,同时可以删除恶意的用户咨询;友情链接可以将政府部门的各单位部门链接在一起,方便交流和联系,可以添加友情链接,同时也可以删除友情链接;公告管理中可以增加公共和删除公告。 以上简单介绍了后天系统的功能和运作模式。

研究目标: 利用JSP和Mysql技术建设政府网站,设计大众化的主页界面,设计好数据库,使得查找方便而又不会造成数据库的冗余太大。设计一个友好的管理界面,使管理者方便管理网站的内容。 把网站放在网上,用户可以进入网站,查看到本机构的概况,检索政策法规,查阅办事流程,阅读政府新闻,观看在线视频,向政府人员提出咨询和疑问,在站内搜索内容,填写问卷调查表。 网站的管理人员可以通过网站将栏目分类管理,增加和删除新闻,上载视频文件,对网上投票进行统计,管理网上办公文件,回答用户的咨询和疑问,删除恶意的用户咨询,添加和删除友情链接等。

解决的关键问题: 用户可以通过进入网站的首页,然后点击各个标题,浏览政府部门发布的信息和相关的通知,同时可以在该网站上了解重大的新闻内容,给政府人员留言,观看一些视频资料等。政府部门工作人员通过网站可以快速的修改、增加、删除需要变动的内容。给人民方便地查看,减轻工作人员繁重的工作量。

(三)、拟采取的研究方案(研究思路、技术路线或研究方法)及可行性分析 1、技术路线。 该网站采用JSP技术,再加上java语言进行开发。数据库采用Mysql。实现了对科技部中大小事务的管理,以及人民和科技部之间沟通的功能。 JSP(Java Server Pages)技术是由Sun公司发布的用于开发动态Web应用的的一项技术,它简单易学,具有跨平台的特性,在众多动态Web应用程序设计语言中异军突起,发展的十分地快,并且广泛地应用到电子商务等各个领域中。 Java语言是一种简单的,面向对象的语言。它的跨平台性能是所有编程语言中的佼佼者,它的编程思想十分地强大,一个用java可以简单解决的问题,用C/C++来做恐怕就会变得很复杂。 Mysql数据库是一种开放源代码的关系型数据库,MySQL数据库系统使用最常用的数据库管理语言——结构化查询语言(SQL)进行数据库管理。简单易学等特点使它广泛地应用到各个领域中去。 本项目涉及门户网站建设、多个应用系统产品升级和定制开发、网络设备及安全设备的升级和集成工作。因此我们将从门户网站建设、网站系统升级改造、网络改造、安全防护四个方面进行。 2、可行性分析。 (1)主观上条件上可行。本人自2004年参加工作,一直在科技部信息中心工作,曾参与科技部门户网站建设、国家科技信息服务网建设、国家科技项目信息共享服务系统等重要信息系统的筹备、建设及运行维护工作,熟悉科技部网络架构及安全防护架构,特别是在xxxx大学软件学院学习软件工程硕士相关课程以来,我对项目管理、业务建模、软件系统开发等有了更加系统的认识。本人有强烈的求知欲望,愿意尝试新技术、新方法,以上均从主观上保证了本建设项目的可行性。 (3)客观上可行。首先,技术路线成熟,理论上可行。国内外对于IPv6的研究成果比较多,成熟的设备及软件公司在研制新产品时均能够考虑到IPv6技术的要求,我们在设备及软件选型、升级改造上多下些工夫,可以保证本建设项目的顺利实施。其次,实验条件上可行。本建设项目得到了国家发改委及科技部的大力支持,项目经费预算合理,项目组拥有较强的研究能力和丰富的科研经验,为完成本课题的研究工作奠定了基础。 综合以上,本课题在主观上和客观上均具有可行性。 (四)本课题的特色及创新之处 1、内容管理系统是在Web页面发布信息,同时提供交互式在线服务。系统将对动态信息采用数据库管理,由程序自动生成Web页面,可以提高信息发布的效率,方便用户查询和使用;在传输加密方面,系统对保密数据进行不对称加密,在用户端利用javascript使用私钥对明文进行加密,确保在网络上传输的是密文,在服务器端对公钥进行解密,从而得到密文。秘钥采用1024位长度,更加强了安全性。 2、对现有的门户网站及其相关的辅助系统进行升级。升级将主要通过两种方式进行,一种是成熟软件和中间件的采购,另一种为基于原有的系统和新采购软件和中间件的升级开发。开发的新应用系统能够支持IPv6地址访问的同时兼容IPv4地址访问,是本项目的重要创新点。 3、在网络改造过程中需要在服务器区高性能交换机、相关网络设备的部署,满足科技部门户网站在IPv6协议下访问的需要。在改造过程中,如何保证网络从仅支持IPv4访问平滑过渡到支持IPv6网络访问并保持门户网站业务的连续性,将是本项目的重要创新点。 4、在门户网站及网络改造中,需要在原有安全设备的基础上对核心防火墙、核心入侵防御、安全域名解析系统等多个安全设备进行改造和替换。如何保证这些安全设备和安全系统能够和网络设备、应用系统实现较好的融合,提供高效的访问和有效的管理将是本项目的重要创新点。 5、在完成安全设备、安全系统有效部署的基础上,对IPv6网络的攻击行为进行监控、拦截和分析,并制定出针对性的解决方法和应对措施,将是本项目的重要创新点。 (五)论文研究进度计划(含研究进度计划安排、研究经费预算及解决办法)、预期研究结果 1、论文研究进度计划: 2013年12月—2014年3月 课题预研,了解面向CNGI的政府门户网站建设研究现状。准备开题答辩。 2014年4月—2014年5月 深入探索研究IPv6技术要求,开展门户网站建设工作和相关服务器中间件升级改造工作。 2014年6月—2014年12月 开展门户网站建设、网站系统升级、网络改造及安全防护工作,基本完成论文初稿。 2015年1月—2015年5月 撰写论文,准备毕业答辩。 2015年6月 结题。 2、预计研究成果 结合实际,通过开发建设门户网站、对网站系统、网络及安全设备进行升级改造,建设出支持IPv4/IPv6双栈协议的安全稳定科技部门户网站。 二、论文研究工作基础及条件保障 (一)工作基础(含入学以来取得研究成果、参与或承担的科研项目情况等) 1、具有软件工程相关知识储备,熟悉网站建设、网站系统、网络及安全设备升级改造的基本知识,熟悉科技部软硬件基础环境。 2、曾参与承担国家级、省部级重要信息系统的开发建设工作,具有丰富的项目管理经验和良好的软件工程建设素养。 (二)、工作条件(设备条件、实验场地条件、可能遇到的困难及应对措施) 1、设备条件:Web服务器、App服务器、后台内容管理服务器、站内检索服务器、视频服务器及SQL Server服务器、检索数据服务器,网络及安全的交换机、防火墙、审计设备,Weblogic、SQL Server等系列中间件,IPS、安全审计、安全DNS系统、流量回溯系统等。 2、实验场地条件:科技部机房。 3、可能遇到的困难及应对措施:因初次开发建设面向CNGI的大型政府门户网站,在建设过程中,可能会在出现部分软硬件升级改造不匹配的情况。若出现突发情况,我们将及时与CNGI专家委员会、软硬件厂商沟通联系,争取的可控的时间内解决异常问题。 三、参考文献(参考文献目录用标准规范格式,在正文引用处须标注) [1] 国务院关于大力推进信息化发展和切实保障信息安全的若干意见. 国发〔2012〕23 号, 2012-06-28. [2] Davies J. 理解IPv6 [M]. 北京: 清华大学出版社, 2004. [3] R. Hinden, Nokia, S. Deering, Cisco Systems. IP Version 6 Addressing Architecture [S].RFC2373, 1998-06. [4] Regis Desmeules. Cisco IPv6 网络实现技术 [M]. 北京: 人民邮电出版社, 2004. [5] 杭州华三通信技术有限公司. IPv6 技术 [M]. 北京: 清华大学出版社, 2010. [6] Ciprian Popoviciu, Eric Levy-Abegnoli, Patrick Grossetete. 部署IPv6 网络 [M]. 北京: 人民邮电出版社, 2007. [7] 郑海涛. IPv6 网络在高校校园网中的建设与实践 [J]. 电脑知识与技术, 2010,(31): 8736-8737. [8] CNNIC. 第30 次中国互联网络发展状况统计报告 [R]. 中国互联网络信息中心,2012: 19-20. [9] 基于IPv6 的下一代互联网体系架构 [S]. 中华人民共和国工业和信息化部,2012-06-01. [10] 刘婷, 孟庆伟, 江凯. 基于校园网平台的IPv6 过渡研究 [J]. 中国新技术新产品,2012, (10): 37. [11] Nominum. Nominum Survey of World’s Leading ISPs Shows Nearly 60 Percent ofISPs Plan to Roll-Out IPv6 by End of 2012 [EB/OL]. [2012-06-05]. http://www.nominum.com/press-release/nominum-ipv6-survey. [12] 侯国平. 基于IPv6 的校园网络模型的研究 [D]. 重庆大学, 2009. [13] CNGI. CNGI 简介 [EB/OL]. [2011-2-18]. http://www.cngi.cn/cngijj/cngijs/cngixz/271329.shtml. [14] 季昌武. 高校校园网IPv6 方案设计 [J]. 中国科技信息, 2011, (8): 117-118. [15] 袁勤勇, 李玮琪. IPv6 技术与应用 [M]. 北京: 清华大学出版社, 2010. [16] 锐捷网络IPv6 校园网解决方案 [S]. 星网锐捷网络有限公司 [17] RG-S3760 系列交换机RGOS10.3(4)版本配置手册 [S]. 星网锐捷网络有限公司 [18] 孙泽宇. 基于RFC5798 的VRRP 协议的研究应用及改进 [D]. 南京大学, 2011. [19] 王鹏. IPV6 下VRRP 的研究与实现 [D]. 西安电子科技大学, 2006. [20] RG-S8600 系列交换机RGOS V10.4(3b7)版本配置手册 [S]. 星网锐捷网络有限公司 [21] 陈坚, 陈伟, 等. Visual C++网络高级编程 [M]. 北京: 人民邮电出版社, 2001. [22] 施炜. Windows Sockets 规范及应用:Windows 网络编程接口 [M]. 北京: 电子工业出版社, 1997. [23] 梁伟. Visual C++网络编程经典案例详解 [M]. 北京: 清华大学出版社, 2010. [24] R. Gilligan, J. Bound, J. McCann, Hewlett-Packard, W. Stevens. Basic Socket Interface Extensions for IPv6 [S]. RFC3493, 2003-02. [25] 解慧娟, 林南晖. 基于IPv4_IPv6 双协议栈的通信模块及实现 [J]. 软件导刊,2011, (11): 110-112. [26] 童振华. 实例解析IPv6 下的VC 网络编程 [EB/OL]. [2003-12-03]. http://www.yesky.com/241/1750241_1.shtml. [27] Microsoft. getaddrinfo function [DB/OL]. [2012-07-20]. http://msdn.microsoft.com/en-us/library/windows/desktop/ms738520(v=vs.85).aspx. [28] 尹成, 颜成钢. Visual C++ 2010 开发权威指南 [M]. 北京: 人民邮电出版社,2010. [29] Starlight. 深入 CSocket 编程之阻塞和非阻塞模式 [EB/OL]. [2005-01-13]. http://www.vckbase.com/index.php/wv/1096. [30] 张伟. IPv6 过渡技术发展历程分析[J]. 电信网技术. 2011(06) [31] 周倩,邹婷,蒋胜. IPv6 发展及演进技术[J]. 电信网技术. 2010(07)

注:报告正文应包括以上三部分,进一步细化的内容可根据情况适当调整。
三、开题报告评价(本项分别由指导教师及专家组填写)
|指导教师对该生选题报告的简要评语(本栏由指导教师在开题报告会之前填写完毕): |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|指导教师签名: 年 月 日 |
|开 |开题报告会时间:2014年4月 1日上午8:30时—12:00时 地点:软件学院 |
| | |
|题 | |
| | |
|报 | |
| | |
|告 | |
| | |
|会 | |
| |评 |姓名 |职称 |所在单位及学科专长 |博导/硕导 |(出席者)签名 |
| |审 | | | | | |
| |专 | | | | | |
| |家 | | | | | |
| |组 | | | | | |
| |成 | | | | | |
| | |xxx |教授 |xxx |硕导 | |
| | |xxxx |研究员 |xxxx |硕导 | |
| | |xxxx |研究员 |xxxx |硕导 | |
| | |xxxx |教授 |xxxxx |博导 | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| |评审意见:(由评审专家组填写) |
| |(正常)通过; |
| |不合格, 年 月 日前重做开题报告。 |
| |其它评语: |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| |评审组长签名: 年 月 日 |

Similar Documents

Premium Essay

Paper on Database Management Systems

...International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012 ISSN 2229-5518 1 A Distributed Transaction Model for a Multidatabase Management System Omar Baakeel and Abdulaziz Alrashidi Abstract— This paper examines the distributed transaction issues that are present in multi-database management systems (DBMSs) and how the distributed transaction in database technology differs from other distributed processing systems. Some common issues that arise with the distribution of transactions over a multi-DBMS while dealing with concurrency control and recovery are highlighted, such as site failure, network failure, and time failure. This study proposes an exceptional distributed transaction model for processing transaction queries in multi-DBMS based on the idea that a complete database can be constructed at any stage. Index Terms— Database management system (DBMS), distributed transaction, transaction management, transaction network —————————— —————————— 1 INTRODUCTION ENERALLY, a distributed transaction is defined as a transaction that updates data on two or more networked computer systems. Different conceptual structures for processing transaction elements are required to meet certain needs of applications that must update distributed data in terms of peer to peer connection. Developing a transaction model is difficult because most of these techniques are customized for a single transaction point, and many types of failures, such as client......

Words: 2094 - Pages: 9

Premium Essay

Database Paper

...Week 1: Database Paper Carmen Lozano DBM/381 John Italiano April16, 2013 When it comes to the health care database systems is a special data processing system, or part of a data processing system, which aids in the storage, manipulation, reporting, management, and control of data. When it comes to a database management system is a collection of software packages designed to store, access and manage databases. Databases are used across the health care industry to able to store patient’s files because the databases are used to store data over a long period of time. In addition it helps organizations have file access to patients file and being able to check the status or enter patients information and sure it with different organizations. When it comes to health care database systems there are four different structural types of database management systems and they are hierarchical databases, network databases, relational databases, and object-oriented databases. Hierarchical database is commonly used on the mainframe computers; this is also the oldest method being used by organizing and storing data, by organizations. This structure follows the pyramid fashion. This means that related fields are grouped together which includes higher-level records and lower-level records. When using this structure there are advantages and disadvantages that go along with this method. The advantages are files can be accessed......

Words: 775 - Pages: 4

Free Essay

Database Concepts Research Paper

...Database concepts research assignment week 9 Don't use Personal Identifiable Information (PII) in your password such as, Name, User name, Birthday, Pet’s name or Child's name. Don't use any word that can be found in the dictionary as your full password. Don’t use the same password for online banking that you use for social networking or email. Don’t give your password to someone over the phone. Try to use special characters such as non-alphabetic characters. Try to create passwords at with at least eight characters. Try to use a password vault application to protect and help manage your many passwords. Try to change your most critical passwords on a regular basis. The Windows operating system already has authentication functionality built-in. It has to do so. And if you're in a domain environment, there are special computers, called Domain Controllers, where authentication actually takes place. Those systems tend to be treated more security than regular servers, even SQL Servers. And therefore, if the username/password combinations are going to be stored on the most secure systems in the domain, that would be on the domain controllers (as a side note, a hash is what is actually stored there, not the password itself). If you let Windows do the authentication, then SQL Server doesn't have to store anything related to a username/password combination. And it's up to Windows to check the security. In other words, SQL Server is handing off this sort of authentication to processes......

Words: 729 - Pages: 3

Premium Essay

Database Normalization and Logical Process Concept Paper

...Database Normalization and Logical Process Concept paper This short paper will explain with a simple example the process and the need of normalization in the most of the business databases. Complete proposal break down (Timeline phases, Financial phases) will be submitted per management request. Overview At first any database should be designed with the end user in mind. Logical database design, also referred to as the logical model, is the process of arranging data into logical, organized groups of objects that can easily be maintained. The logical design of a database should reduce data repetition or go so far as to completely eliminate it. The needs of the end user should be one of the top considerations when designing a database. We should remember trough all design process that the end user is the person who ultimately uses the database. There should be ease of use through the user's front-end tool (a client program that allows a user access to a database), but this, along with optimal performance, cannot be achieved if the user's needs are not taken into consideration. Some user-related research and design considerations in any business database include the following: What data should be stored in the database? How will the user access the database? What privileges does the user require? How should the data be grouped in the database? What data is the most commonly accessed? How is all data related in the database? What measures should be taken to ensure accurate......

Words: 1393 - Pages: 6

Premium Essay

Database

...CIS 210 Week 7 Assignment 4 08/15/2012 Abstract In this paper I intend to address the following: * Discuss the requirements needed to build a database for the scheduling process. * Describe the advantages and disadvantages of moving the schedule to a database. * Create a graphical representation of your proposed database environment. * Explain how referential integrity can prevent mistakes in a database. Do the advantages outweigh the difficulty of setting it up? * Impress your boss by creating a database in Microsoft Access that will match trainers with courses and meet the following requirements: * Two (2) tables, one (1) containing trainer information and the other containing course information. Create data for five (5) instructors and five (5) courses. The trainer data should include: employee ID number, last name, first name, department, and email address. The course data should include: course number, course name, trainer employee ID number, and training location. * A relationship should exist between the tables. * Use referential integrity to make sure that each course has a valid trainer assigned to it. Week 7 Assignment 4 * Discuss the requirements needed to build a database for the scheduling process. The first step in creating a database is creating a plan that serves both as a guide to be used when implementing the database and as a functional specification after it has been implemented. The complexity and......

Words: 681 - Pages: 3

Premium Essay

Database Design Paper

...A database management system, or DBMS, is the category of computer software programs that are used in the creation, organization, retrieval, analysis, and sorting of information in computer-based databases. A database management system is comprised of: * A modeling language, which is used to define the database structure. Commonly, database structures are hierarchical, network, relational, and object based. How they go about connecting related information is where models differentiate. The relational database model is the most widely used. * A database engine, which manages the structure of the database and optimizes data storage for a balance of quick retrieval of information and an efficient usage of space. * A database query language, that allows developers to write programs that extract data from the database, present it, and allow for the saving and storage of changes. * A transaction mechanism, which validates data before storing it while also ensuring numerous users are not allowed to corrupt the data by updating the same data at the same time “Database architecture focuses on the design, development, implementation and maintenance of computer programs that store and organize information for business, agencies and institutions”. One such example is Microsoft SQL Server. There are four system databases in each instance of Microsoft SQL Server (master, model, tempdb, and msdb) and at least one user database. Some companies have a database used by...

Words: 260 - Pages: 2

Free Essay

Database Design Paper

...Database Design Paper DBM380 March 09, 2015 Database Design Paper A database is a computer structure that organizes a collection of data so that it can be accessed, updated and managed as fast and efficiently as possible. There are several classifications of databases, “For example, databases can be classified by the number of users supported, where the data are located, the type of data stored, the intended data usage, and the degree to which the data are structured. The number of users determines whether the database is classified as single-user or multiuser. A single-user database supports only one user at a time. In other words, if user A is using the database, users B and C must wait until user A is done. A single-user database that runs on a personal computer is called a desktop database. In contrast, a multiuser database supports multiple users at the same time. When the multiuser database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization, it is called a workgroup database. When the database is used by the entire organization and supports many users (more than 50, usually hundreds) across many departments, the database is known as an enterprise database” (Coronel, Morris, & Rob, 2013, p. 9). Database architecture describes the rules that dictate how data is stored in a database and how data is accessed by components of a system. Database management software, such as Oracle, is designed to......

Words: 404 - Pages: 2

Premium Essay

Database Design Paper

...Database Design Paper Amanda Chavez DBM/380 February 16, 2015 Pamela Hurd It is important for a business to keep track of certain data. Data management works best if the business has a computer database. A database is a computer structure that stores end-user data and metadata. A database allows data to be saved, managed and retrieved whenever data is needed. It is essential for businesses to save all of their data, such as products they are selling, because this type of data can become useful when there is a decision to be made. Businesses can use the data as a source. Businesses use databases as a way to store their data. They are able to retrieve the data whenever they need it. Modern businesses depend heavily on databases. Databases store a business’ valuable data. A business’ database can hold email addresses, phone numbers, and names which can help the business sell more of their products and/or services. Databases are also used to provide information to the general public. For example, long ago we used the Yellow Pages to look up a person’s contact information. Nowadays, the YP book is still made but they also have the website, which is more modern for today. Database architecture uses programming languages to design, develop, implement and maintain a certain type of software that allows businesses to store information. The goal is to meet the needs of users. Oracle is an example of database architecture. Oracle Database is the first database created for......

Words: 474 - Pages: 2

Premium Essay

Database Paper

...Database Environment Paper This database environment paper contains info about a database environment for an art museum. The art museum will track artwork, artists and locations of where specific art pieces are held in the museum. An analysis of the environment will be covered, along with a description of the problems and constraints. A description of the objectives of the database environment along with the scope and boundaries are included as well. Lastly, a small list of data specifications is included. The arrangement of a collection of data is not a simple procedure. Normally, the intricacies of the data wants and the number of data methods make it difficult.  As a result, arranging a collection of data is best suited to practice the traditional plan of action of separate and overcome. As a result, it should break down the arrangement method in many levels, with every transitional development is acquired that works as a beginning mark for the following phase and the final phase produces the wanted effect. In doing so, this removes the want to answer every question at one time ("Stages of Database Design", n.d.). In the case of the Denver Art Museum, a database must be created that allows users to track all the artworks, the artists who created them, and places within the museum where these works of art displayed. With an assortment of more than seventy thousand pieces of art distributed among 9 long-lasting assortments that includes western American art,......

Words: 965 - Pages: 4

Premium Essay

Database

...ESSAY. Write your answer in the space provided or on a separate sheet of paper. 1) Discuss the differences between an equi-join, natural join and outer join. • Equi-Join - In equi­join rows are joined on the basis of values of a common attribute between the two relations. It means relations are joined on the basis of common attributes between them. This means on the basis of primary key, which is a foreign key in another relation. Rows having the same value in the common attributes are joined. Common attribute with the same name is qualified with the relation name in the output. • Natural Join - This is the most common and general form of join. In other words, it means the natural join. The difference is that in natural join, the common attribute appears only once. Hence, it does not matter which common attribute should be part of the output relation as the values in both are same. • Outer Join - In outer join all the sequences of left and right relations are part of the output. It means that all those sequences of left relation which are not matched with right relation are left as Null. Similarly all those sequences of right relation which are not matched with left relation are left as Null TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 2) In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with the IN qualifier. 2) T MULTIPLE CHOICE. Choose the one......

Words: 696 - Pages: 3

Premium Essay

Databases

...University of Phoenix Material Determining Databases and Data Communications Read Scenario 1 and Scenario 2 below. Write a paper of no more than 1,500 words in which you respond to the questions designated for both scenarios. Scenario 1: You are a marketing assistant for a consumer electronics company and are in charge of setting up your company’s booth at trade shows. Weeks before a show, you meet with the marketing managers and determine what displays and equipment they want to display. Then, you identify each of the components that need to be shipped and schedule a shipper to deliver them to the trade show site. You then supervise trade show personnel as they set up the booths and equipment. After the show, you supervise packing the booth and all the equipment as well as schedule its shipment back to your home office. When the equipment arrives, you check it into your warehouse to ensure that all pieces of the booth and all the equipment are returned. If there are any problems due to shipping damage or loss, you handle those problems. Your job is important; at a typical show you are responsible for more than a quarter-million dollars of equipment. • In Scenario 1: o You need to track data about booth components, equipment, shippers, and shipment. List typical fields for each type of data. Provide an example of two relationships that you need to track. o Do you need a database system? If not, can Excel® handle the data and the output? What...

Words: 436 - Pages: 2

Premium Essay

Database Environment Paper

...Database Environment Smith Consulting is a firm that focuses building applications for their clients. One of the biggest core values within this company is to maintain the security of the data that they for which this company builds applications. ("Smith Consulting Intranet", 2015) The main focus of this company is the creation of efficient financial applications as well as other functional applications as requested. The company has about 350 employees that currently working for them across all sites ("Smith Consulting Intranet", 2015). From the company intranet there does not seem to be a current database in place for that tracks their consulting staff, clients, each staff member's skill sets, and what projects they are working on. In order to create a database we would have to first select the best database environment for the project. Within this situation the database would not house confidential information so the need for strong security would not be necessary. For this particular database the amount of data that is being imported into the database is rather small. The company has 4 main clients and 350 employees. The system that I would select for this project would be Access. Access can handle all of the data that is needed to create this Project Database. SQL and Oracle are create database structures when dealing with huge amounts of data, this would not be the case in this situation and it would not be feasible to spend the extra money on......

Words: 896 - Pages: 4

Premium Essay

Database Paper

...Database Dictionary.com defines database as “a systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated”. In today’s business, organizations run on data that have been processed into information and knowledge. That information is used by managers to apply to business problems and opportunities. Furthermore the data is transformed into knowledge and solutions in many different ways after detail analysis. Because data and information are processed in several stages and often in several places, they are frequently subject to problems and difficulties. Managing data in organizations is difficult for many reasons, so organizations in the effort to manage all of the data, developed databases to organize all of the collection. These databases are managed using database management systems, and by utilizing different applications. In our organization, we do have a database that we use for our data collection and analysis and storage of all the data we collect. We also use several applications in the daily operations of our business which I will explain further in this paper. Our organization is currently using several applications to make our processes more precise, effective and efficient. Currently, our organization is using a Sybase SQL database as the main database for all of our business functions. This database delivers extreme transaction processing and access to mission critical......

Words: 732 - Pages: 3

Free Essay

Database Design Paper Dbm 380

...Database Design Paper Joseph Schmosef University Of Phoenix (ecampus) DBM/380 Sunday, April 01, 2012 “A database is a structured collection of records or data that is stored in a computer system. In order for a database to be truly functional, it must not only store large amounts of records well, but be accessed easily. In addition, new information and changes should also be fairly easy to input.” (tech-faq.com) To ensure usefulness over the long-term, databases should be built with high data integrity and the ability to recover data if the hardware fails. Information that has been corrupted or destroyed serves no purpose within a business structure. Being the Armed Forces is like being a field value in one giant database. Everything from the gear we are issued to how we are identified as an “individual” (ssn#) is a scannable number to be coded, referenced, and utilized by anyone with proper clearance. “The database architecture is the set of specifications, rule, and processes that dictate how data is stored in a database and how data is accessed by components of the system.” (wingenious.com) Database architecture type s can be broken down into three broad categories, each of which can have several subcategories: One Tier, Two Tier- client/server, and “N” Tier- client/server. The One Tier architecture is best suited to the single user and relatively small amounts of data. It runs on the user’s local machine and references a file that is stored on that......

Words: 668 - Pages: 3

Premium Essay

Memorandum Paper Database

...18.5/20 Database Memorandum Paper J. S CIS/319 –Computer and Information Processing 07/23/2012 Prepare a 2- to 3-page memorandum analyzing the use of databases in a business environment. Include what database applications should be used: Microsoft® Access®, IBM® DB2®, Oracle®, and so on. Conclude by proposing improvements. For large organizations, restrict the scope of the paper to the department in which you work. The use of database in the business environment has become an integral part in business processing. According to an article, Database Evolution: Microsoft Access within an Organization's Database Strategy, Chung explains that databases are used in a variety of levels for various reasons: Enterprise level, Department level, Workgroup/Team Level and Individual/small groups. With these, database systems are used as data centers in order for companies to process data, whether customer transactions, storing information (business) or to maintain security. The most popular database used today is Microsoft Office Access, or which most know it as Microsoft Access. This was developed my Microsoft Corporation and can also be used as a “frontend” with other products as the “backend” table. Which means that all the data processing can be done by Microsoft SQL Server, a Microsoft product and other database applications, for example Oracle. Microsoft Access is the main database application used by our company (Affiliated Computer Service). Due to the nature of our......

Words: 825 - Pages: 4