4) Istb Notes
4) Istb Notes
A database object in a relational database is a data structure used to either store or reference data. The
most common object that people interact with is the table. Other objects are indexes, stored
procedures, sequences, views and many more.
When a database object is created, a new object type cannot be created because all the various object
types created are restricted by the very nature, or source code, of the relational database model being
used, such as Oracle, SQL Server or Access. What is being created is instances of the objects, such as a
new table, an index on that table or a view on the same table.
Most of the major database engines offer the same set of major database object types:
Tables
Indexes
Sequences
Views
Synonyms
1. Tables
Oracle stores information in the form of tables. For eg you can have a table named as climate in which
you can store information about the climate of a place in the form of columns which could be the
temperature, name of the place, date, humidity, etc. In the terms of a relational database, one can call a
table as an entity and the columns as it attributes.
2. Indexes
Indexing is a concept of listing of keywords accompanied by the location of information of the subject.
Indexes are used to speed up the processing, especially searching.
3. Views
A view is a way of hiding the logic that created the joined table just displayed. For example: create view
AB
Select A.x, B.y from A, B where A.x = B.y;
You can query it as select x, y from AB.
Note: AB is the view name, A, B are the Table names with x and y as their column names respectively.
For views, you don’t need to specify the tables as the logic is hidden inside the views.
4. Synonyms
A synonym is a name assigned to a table or view that may be used refer to it thereafter. If you have an
access to another users table, you may create a synonym for it and refer to it by the synonym alone,
without entering the users name as a qualifier. Using synonyms is a good way to implement location
transparency.
5. Sequences
Tables usually have a primary key which uniquely identifies a row in a table. A sequence is a unique
number generator which can be assigned to the primary keys of the tables.
Eg create sequence xyz
increment by 1
start with 1;
2. EXPLAIN THE THREE-TIER APPLICATIONS ARCHITECTURE WITH IMPORTANCE OF EACH
A three-tier architecture is a client-server architecture in which the functional process logic, data
access, computer data storage and user interface are developed and maintained as independent
modules on separate platforms. Three-tier architecture is a software design pattern and a well-
established software architecture.
Three-tier architecture allows any one of the three tiers to be upgraded or replaced independently.
The user interface is implemented on a desktop PC and uses a standard graphical user interface
with different modules running on the application server. The relational database management
system on the database server contains the computer data storage logic. The middle tiers are
usually multitiered.
1. Presentation Tier: Occupies the top level and displays information related to services
available on a website. This tier communicates with other tiers by sending results to the
browser and other tiers in the network.
2. Application Tier: Also called the middle tier, logic tier, business logic or logic tier, this tier is
pulled from the presentation tier. It controls application functionality by performing detailed
processing.
3. Data Tier: Houses database servers where information is stored and retrieved. Data in this
tier is kept independent of application servers or business logic.
3. EXPLAIN Etom LEVEL ZERO WITH A SUITABLE DIAGRAM. (ROWS & COLUMNS TITLES
ONLY)
The Business Process Framework (eTOM) describes and analyzes different levels of enterprise processes according
to their significance and priority for the business. The framework is defined as generically as possible so that it
remains organization-, technology-, and service-independent.
For service providers, the Business Process Framework serves as the blueprint for process direction. It also provides
a neutral reference point for internal process reengineering needs, partnerships, alliances, and general working
agreements with other companies.
For suppliers, the Business Process Framework outlines potential boundaries of software components that should
align with their customers' needs, as well as highlighting the required functions, inputs, and outputs that must be
supported by their products. At the overall conceptual level (Figure 3), the Business Process Framework can be
viewed as having the following three major process areas:
• Strategy, Infrastructure, and Product (SIP) covering planning and lifecycle management
• Operations covering the core of day-to-day operational management
• Enterprise Management covering corporate or business support management
Figure 3. eTOM Level 0 Model (Copyright TM Forum)
The Level 0 Framework also includes views of functionality as they span horizontally across an enterprise's internal
organizations:
• Market, Product, and Customer: High-level view of the market and the enterprise's offerings
• Service: Product components developed by the enterprise
• Resource (Application, Computing, and Network): Consumed in the production of the Service
• Supplier/Partner: Providing products and services to the enterprise for the production of the Service
The eTOM layers can generally be described as following:
• Level 0: Business Activities that distinguish operational customer-oriented processes from management and
strategic processes
• Level 1: Process Groupings including business functions and standard end-to-end processes
• Level 2: Core Processes that combine together to deliver service streams and other end-to-end processes
• Level 3: Tasks and associated detailed "success model" business process flows
• Level 4: Steps and associated detailed operational process flows with error conditions and product and
geographical variants (where required)
• Level 5: Further decomposition into operations and associated operational process flows where required
4. STATE THE AREAS ADDRESSED IN ENTERPRISE MANAGEMENT AND EXPLAIN ANY ONE IN
DETAIL.
5. STATE THE SIMILARITIES/DIFFERENCE BETWEEN ETOM AND ITIL WITH REFERENCE TO
SCOPE, IMPLEMENTATION AND COMPLIANCE.
eTOM ITIL®
Context • eTOM is a prescriptive catalogue of Process • ITIL ® is a set of nonprescriptive guidelines for IT/ICT
Element categories and a total enterprise Service Management.
process framework for the ICT industry.
Objectives • Provides a business process blueprint for • Aligns IT services with the current and future needs of
service providers to streamline their end-to- the business and its customers.
end processes. • Enables standard terminology across business and IT.
• Enables effective communication and common • Improves the quality of the IT services delivered.
vocabularies within the enterprise as well as
with customers and suppliers. • Reduces the long-term cost of service provision.
Scope • Provides a top-down hierarchical view of • The ITIL ® processes represent flows in a number of key
business processes across the whole operational areas, with a strong orientation towards how
enterprise and does not itself address how these processes will map onto IT support environments.
these processes are supported by automated • Processes are developed through flows.
or human action (this is, however, addressed
in the wider NGOSS program of the TMF). • It is primarily nonprescriptive, offers advice and guidance
on the implementation and continued delivery of service
• Processes are developed through iterative management, including planning common processes,
decomposition. roles, and activities with appropriate reference to each
• It focuses on identifying the commonality of other and how the communication lines should exist
enterprise processes required among similar between them.
services, such as telephony, data, Internet, • ITIL ® is primarily focusing on serving internal IT
mobiles, etc., for delivering high-quality, end- customers.
to-end service management.
• eTOM focuses on service delivery to external
customers.
Adoption • eTOM has been adopted as ITU International • ITIL ® is a set of best practices that is used by tens of
Standards for the Telecom Sector, and thousands of companies worldwide and continues to be
primarily used by Service Providers in the ICT advanced by itSMF local chapters:http://www.itsmf.com/
industry. eTOM is advanced by TM
Forum: http://www.tmforum.org/
Implementati • eTOM is a framework; therefore, the • ITIL ® is a framework; therefore, the implementation will
on implementation will be different from company be different from company to company.
to company. • Until recently, ITIL ® did not provide guidelines on the
• The implementation of eTOM is supported by implementation order or means to assess the maturity of
other TMF/NGOSS specifications, including the service organization. In Version 3, more attention is
the Shared Information/Data Model (SID), being paid to implementation guidelines.
NGOSS Lifecycle and Methodology, and other
related specifications.
Compliance • eTOM compliance is achieved through the • ITIL ® is not a standard, nor is it a set of regulations, and,
TMF/NGOSS Compliance Program; its therefore, neither tools, processes, or people can be
certification is on tools not on organizations or deemed "ITIL ® compliant." Processes and organizations
processes. NGOSS compliance program can be assessed against ISO 20000, the IT Service
encompass the conformance tests of other Management standard based on ITIL ®. However, neither
NGOSS specifications that further define the tools nor individuals can be certified against ISO 20000.
business objects and operations framework
required for effective eTOM implementation.
6. MAPPING THE CARDINALITIES
A mapping cardinality is a data constraint that specifies how many entities an entity can be
related to in a relationship set. Example: A student can only work on two projects, the number of
students that work on one project is not limited.
A binary relationship set is a relationship set on two entity sets. Mapping cardinalities on
binary relationship sets are simplest. Consider a binary relationship set R on entity sets A and B.
There are four possible mapping cardinalities in this case:
1. one-to-one - an entity in A is related to at most one entity in B, and an entity in B is
related to at most one entity in A.
In a relational database system like Access, you often need to extract information from more than
one table at a time. This can be accomplished by using an SQL JOIN statement, which enables
you to retrieve records from tables that have defined relationships, whether they are one-to-one,
one-to-many, or many-to-many.
INNER JOINs
The INNER JOIN, also known as an equi-join, is the most commonly used type of join. This join
is used to retrieve rows from two or more tables by matching a field value that is common
between the tables. The fields you join on must have similar data types, and you cannot join on
MEMO or OLEOBJECT data types. To build an INNER JOIN statement, use the INNER JOIN
keywords in the FROM clause of a SELECT statement. This example uses the INNER JOIN to
build a result set of all customers who have invoices, in addition to the dates and amounts of
those invoices.
OUTER JOINs
An OUTER JOIN is used to retrieve records from multiple tables while preserving records from
one of the tables, even if there is no matching record in the other table. There are two types of
OUTER JOINs that the Access database engine supports: LEFT OUTER JOINs and RIGHT
OUTER JOINs. Think of two tables that are beside each other, a table on the left and a table on
the right. The LEFT OUTER JOIN selects all rows in the right table that match the relational
comparison criteria, and also selects all rows from the left table, even if no match exists in the
right table. The RIGHT OUTER JOIN is simply the reverse of the LEFT OUTER JOIN; all rows
in the right table are preserved instead.
This is not a good thing, especially with tables that contain hundreds or thousands of rows. You should
avoid creating Cartesian products by always qualifying your joins.
8. MIDDLEWARE
9. THIN CLIENT
A thin client (sometimes also called a lean, zero or slim client) is a computer or a computer program that
depends heavily on another computer (its server) to fulfill its computational roles. This is different from
the traditional fat client, which is a computer designed to take on these roles by itself. Thin-client
computing is also a way of easily maintaining computational services at a reduced total cost of
ownership. The most common type of modern thin client is a low-end computer terminal which only
provides a graphical user interface – or more recently, in some cases, a web browser – to the end user.
Thin clients occur as components of a broader computer infrastructure, where many clients share their
computations with the same server. As such, thin client infrastructures can be viewed as providing some
computing service via several user interfaces. This is desirable in contexts where individual fat clients
have much more functionality or power than the infrastructure requires.
Client/ Server technology is a means for separating the functions of an application into two or more distinct
parts. Client/ server describes the relationship between two computer programs in which one program, the
client, makes a service request from another program, the server, which fulfills the request. The client presents
and manipulates data on the desktop computer. The server acts like a mainframe to store and retrieve
protected data. It is network architecture in which each computer or process on the network is either a client or
a server. Servers are powerful computers or processes dedicated to managing disk drives (file servers),
printers (print servers), or network traffic (network servers). Clients are PCs or workstations on which users run
applications. Clients rely on servers for resources, such as files, devices, and even processing power.
Objective
Client - Server Technology
A client/ server model has following three distinct components, each focusing on a specific job:
Database server
Client application
Network.
Database Server
A server (or "back end") manages the resources such as database, efficiently and optimally among various
clients that simultaneously request the server for the same resources. Database server mainly concentrates on
the following tasks.
Managing a single database of information among many concurrent users.
Controlling database access and other security requirements.
Protecting database of information with backup and recovery features.
Centrally enforcing global data integrity rules across all client applications.
Client Application
A client application (the "front end") is the part of the system that users apply to interact with data. The client
application in a client/ server model focus on the following job:
Presenting an interface between the user and the resource to complete the job Managing presentation logic,
Performing application logic and Validating data entry Managing the request traffic of receiving and sending
information from database server
Network
The third component of a client/ server system is network. The communication software is the vehicles that
transmit data between the clients and the server in client server system. Both the client and the server run
communication software that allows them to talk across the network.
Front-end and back-end are terms used to characterize program interfaces and services relative
to the initial user of these interfaces and services. (The "user" may be a human being or a
program.) A "front-end" application is one that application users interact with directly. A "back-
end" application or program serves indirectly in support of the front-end services, usually by
being closer to the required resource or having the capability to communicate with the
required resource. The back-end application may interact directly with the front-end or,
perhaps more typically, is a program called from an intermediate program that mediates front-
end and back-end activities.
The front end typically includes the HTML, CSS and JavaScript that creates pages, menus,
buttons and everything else that forms the basis of what the user sees in his or her Web
browser. So someone working as a front-end developer would be familiar with code that
focuses on display, and may also have Web design skills with tools like Photoshop.
The back end generally includes a Web server that hosts an application (built with code like
PHP, Python, Ruby on Rails, C/C#/C++ , .NET, or Java), which communicates with a database
(using something like MySQL or Microsoft Access) to serve up the information that the front-
end presents. Back-end developers have expertise in building applications that can efficiently
locate and deliver data. Increasingly, companies are turning to Backend-as-a-Service vendors
who can make this processing faster, particularly for mobile application development.
As an example of how front-end and back-end systems work together, consider a website that
has different content that is accessible to users with different permissions. When a user visits
the website and attempts to access a certain page, he or she will be asked to log in; that login
information will be authenticated via a database lookup, and then the back-end application
communicates with the front end (sometimes via an intermediary program) to display the
proper page to the user.
13. SAN
SAN (storage area network) is a high-speed network of storage devices that also connects those
storage devices with servers. It provides block-level storage that can be accessed by the
applications running on any networked servers. SAN storage devices can include tape libraries
and disk-based devices, like RAID hardware.
SANs are particularly helpful in backup and disaster recovery settings. Within a SAN, data can
be transferred from one storage device to another without interacting with a server. This
speeds up the backup process and eliminates the need to use server CPU cycles for backup.
Also, many SANs utilize Fibre Channel technology or other networking protocols that allow the
networks to span longer distances geographically. That makes it more feasible for companies to
keep their backup data in remote locations.
Utilizing a SAN can also simplify some management tasks, potentially allowing organizations to
hire fewer IT workers or to free up some IT workers for other tasks. It's also possible to boot
servers from a SAN, which can reduce the time and hassles involved in replacing a server.
14. NGOSS
NGOSS presents a number of benefits to the various industry players, such as:
• For service providers
– Facilitate the implementation of cost-effective OSS/BSS solutions through standard
specifications and interfaces
– Provide long-term direction for IT strategy by specifying a business process framework
– Enable IT systems to support rapidly evolving integrated service offerings by offering a logical
system view independent of the particular service or software provider
– Reduce operational costs through tighter coupling of business processes and more
automation
• For OSS software vendors
– Reduce development costs by using a standard framework specification
– Simplify interoperability with other components based on a standard set of interfaces and use
cases
• For systems integrators
– Facilitate predictable, repeatable, and scalable implementation projects by using standard
components
– Enable a broader, multivendor portfolio without a steep learning curve through the use of a
common set of specifications
ITIL is a best practice framework that has been drawn from both the public and private sectors
internationally. It describes how IT resources should be organised to deliver business value,
documenting the processes, functions and roles of IT Service Management (ITSM).
ITIL BENEFITS
The Information Framework (SID) provides a reference model and common vocabulary for all
the information required to implement Business Process Framework (eTOM) processes. It
reduces complexity in service and system integration, development and design by providing an
off the shelf information model that can be quickly adopted by all parties.
3. What is the Application Framework?
The Application Framework (TAM) provides a systems map which captures how business
capabilities are implemented in deployable, recognizable applications. The Application
Framework provides a common language for communities who specify, procure, design, and
sell systems, so that they can understand each other’s viewpoints. It provides logical groupings
of applications, then describes each application’s functionality. As a result, it is a practical,
everyday working guide to define and navigate the elements of the complex management
systems landscape.
The Integration Framework is a set of standards that supports the interoperability between
applications defined in the Application Framework via TM Forum interfaces. The interfaces are
defined in terms of the Information Framework’s entities/attributes, and the requirements for
the interfaces from a business process perspective come from the Business Process Framework.
The interface patterns are standardized ensuring optimal interoperability on implementation.
The Integration Framework acts as the glue that holds together the other Frameworks in an
implementation: This is why the Integration Framework is shown in the middle of the
Frameworx graphic.
The RENAME operator returns an existing relation under a new name. This is a
Mechanism used for renaming both relations and attributes, this renaming is highly
useful when one has to compare a set of tuples of the same relation with other
tuples of that relation. It has the following general format :
old_name as new-name
Parameters or Arguments
expression1, expression2, ... expression_n
Expressions that are not encapsulated within an aggregate function and must be
included in the GROUP BY Clause at the end of the SQL statement.
aggregate_function
This is an aggregate function such as the SUM, COUNT, MIN, MAX,
or AVG functions.
aggregate_expression
This is the column or expression that the aggregate_function will be used on.
tables
The tables that you wish to retrieve records from. There must be at least one table
listed in the FROM clause.
conditions
These are conditions that must be met for the records to be selected.
SOA is viable today because there still are so many different ways of doing things within it. The
technologies that fall under the SOA umbrella and the enterprise-service-bus umbrella are so diverse.
21. SID
SID (Shared Information and Data model) is one of the frameworks of the TMForum NGOSS Frameworx
suite. It is also called the Information Framework. SID can be considered as the language of the NGOSS.
It helps us to identify the business entities that play role in the business processes of a
telecommunications service provider.
SID and eTOM goes hand-in-hand and TMForum provides mappings between them. SID Domains are
consistent with the eTOM domains. The Domains include the Level 1 ABEs which are also mapped to
eTOM Level 2 business processes. What an ABE is? Well, it is the abbreviation for Aggregate Business
Entity, which means an entity that can further be decomposed to other sub-entities. (Just like the
decomposition we see in the eTOM hierarchy).
SID Business Entities are modeled in UML diagrams and can be imported to UML tools. (TMForum
publishes them in different importable formats). The framework also comes with an extensive
documentation that explains the structure and the behaviors of the business entities. Typically, you will
find an abbreviation document for each ABE.
Today, OSS application vendors are more NGOSS aware and they try to design/re-design their products
based on NGOSS. In order for two different OSS systems to communicate effectively, their data
structures should be consistent with each other. This way, it will require minimum conversion during the
conversation. OSS/J enables this on the API level but the data structure of the application is also
important. Using SID in designing applications eases the integrations between the different applications.
Explaining your OSS product in SID terms will also be appreciated by your customers and
supplier/partners.
This failover method helps to ensure that data access will continue transparently to the user and allows
technicians to take the server down to replace the defective controller at a more opportune time,
instead of at the moment of failure. The ability to choose when the server comes down can be very
advantageous, because -- in accordance with Murphy's Laws of Information Technology (Law of
Inconvenient Malfunction) -- a device is likely to fail at the least opportune possible moment.
Nevertheless, some experts advocate other systems (such as higher level RAID configurations) that don't
require taking the server down to replace defective hardware.
Another benefit of disk duplexing is increased throughput. Using a technique known as a split seek,
whichever disk can deliver the requested data more quickly responds. Multiple requests may also be
split between the disks for simultaneous processing.
24.
25.
27. DSS
A decision support system (DSS) is a computer-based information system that supports business
or organizational decision-making activities. DSSs serve the management, operations, and
planning levels of an organization (usually mid and higher management) and help people make
decisions about problems that may be rapidly changing and not easily specified in advance—i.e.
Unstructured and Semi-Structured decision problems. Decision support systems can be either
fully computerized, human-powered or a combination of both.
1. DSS tends to be aimed at the less well structured, underspecified problem that upper
level managerstypically face;
2. DSS attempts to combine the use of models or analytic techniques with traditional data
access and retrieval functions;
3. DSS specifically focuses on features which make them easy to use by noncomputer
people in an interactive mode; and