Thursday, April 14, 2005

Request To Disconnect Service Letter

Benefits BD's approach


Reduce redundancy

If present, must be controlled by the DBMS

In systems with BD each application has its own private files. This can cause considerable redundancy in stored data. With the consequent waste of storage space. You may have some redundancy but is controlled by the DBMS, and take responsibility for "propagating the updates."

Avoid inconsistency

(somewhat) erroneous data.

is a corollary of the above. If redundancy is eliminated, there is no inconsistency. If redundancy is not removed, there is inconsistency. Redundancy, if controlled by the DBMS ensures the consistency of the database from the point of view of ensuring user automatically apply to the other input any changes made in one of them (spread of updates). Today most of the products do not allow the controlled redundancy, except in a few exceptional cases.

Share data

DBMS is responsible if a data is being updated and the other can not access.

is possible to satisfy the information needs of new applications without having to store additional data. The chamber ( sharing ) also allows to develop new applications to work with the same stored data.

Enforce

By having centralized control of the database, the DBA (as directed by DA) may ensure compliance with all applicable standards for data representation. It is desirable primarily as support for the exchange of information or data migration between systems. The rules for naming and documenting the data is very convenient to help the chamber and comprehensibility of information.

Apply security restrictions

By having complete jurisdiction over the database, the DBA can:

a) To ensure that access the BD is only through the proper channels.

b) Define the security checks performed when attempting to access sensitive information.

verification is feasible to set different for each type of access to every piece of information from the database.

Maintaining the integrity

defines and controls the DBMS, DBA tells the DBMS

That the information is correct. To avoid erroneous information, the data administrator defines (and implements DBA) integrity checks to be made in any update operation (insertion, deletion and modification) data. Without proper controls, a user might incorrectly modify the database, creating misinformation and "infecting" and other users

Balancing conflicting requirements

By knowing the general requirements of an enterprise (as opposed to any individual user), the DBA can structure the system with a view to providing a general "best for the company." For example you may choose a form representation of the stored data with which the most important applications can have quick access while running other applications undermined.

is not so obvious but have the independence of the data (target of BD systems).

data independence :

- POSSIBILITY OF CHANGING THE STRUCTURE OF THE DATA AND NOT rewrite or CHANGE. EXAMPLE, THE LAST 20 CHARACTERS, MODIFY THE STRUCTURE OF STORAGE AND SHOULD NOT INFLUENCE IN THE PROGRAMS APPLICATION, DO NOT TOUCH.

- BUT IT IS DIFFICULT ASPIRA.

Independence may be defined as the immunity of applications to changes in the storage structure and access technique, which means that applications do not depend on a storage structure or access technique specific.

0 comments:

Post a Comment