CS 501: Software Engineering Fall 2000 Lecture 14 System Architecture I Data Intensive Systems.

Slides:



Advertisements
Similar presentations
Scan Checks Remotely Electronically Deposit and Clear YOU GET YOUR MONEY FASTER Your Location Bank.
Advertisements

CS CS 5150 Software Engineering Lecture 14 System Architecture 2.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Refunds More Hassle Than They’re Worth Utility Payment Conference.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Chapter 17: Client/Server Computing Business Data Communications, 4e.
CS CS 5150 Software Engineering Lecture 14 System Architecture 2.
1 CS 501 Spring 2007 CS 501: Software Engineering Lecture 13 System Architecture and Design I.
1 CS 501 Spring 2007 CS 501: Software Engineering Lecture 14 System Architecture and Design 2.
CS 5150 Software Engineering
1 CS 501 Spring 2006 CS 501: Software Engineering Lecture 13 System Architecture and Design I.
Chapter 7 e-Business Systems.
CS CS 5150 Software Engineering Lecture 13 System Architecture and Design 1.
Introduction to Databases Transparencies
Chapter 7: Client/Server Computing Business Data Communications, 5e.
1 CS 501 Spring 2008 CS 501: Software Engineering Lecture 14 System Architecture and Design 2.
CS CS 5150 Software Engineering Lecture 14 System Architecture 2.
1 CS 501 Spring 2006 CS 501: Software Engineering Lecture 14 System Architecture and Design 2.
CS 501: Software Engineering Fall 2000 Lecture 15 System Architecture II Distributed and Real Time Systems.
1 CS 501 Spring 2005 CS 501: Software Engineering Lecture 13 System Architecture and Design I.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 7 e-Business Systems.
Chapter Lead Black Slide © 2001 Business & Information Systems 2/e.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
INTRANETS DEFINITION (from Cambridge International Dictionary of English) intra- Combining form used to form adjectives meaning 'within' (the stated place.
Introduction to Databases Transparencies 1. ©Pearson Education 2009 Objectives Common uses of database systems. Meaning of the term database. Meaning.
TRANSACTION PROCESSING SYSTEM Liew Woei Song Muhammad Hofiz Achoson.
Intranet, Extranet, Firewall. Intranet and Extranet.
PayDox Corporate Document Management System Rotech AB Interface Ltd Business Software Integration.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 10 Business Operations.
Additional Structure Exercise 2 ANSWERS NB. As not whole case study was given some of these answers may not be within the text.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 13 System Architecture and Design I.
GENERAL BANK MANAGEMENT Technology Management
Transaction Processing System
Transaction Processing System  Business Transactions are certain events that occur routinely in a business firm.  A transaction is a set of activities.
Delight QuickBooks Online Banking Internal Support Training QuickBooks Windows 2009/2010 Online Banking.
CS CS 5150 Software Engineering Lecture 18 Security.
Examples of TPS 1 In this section, we examine the: components of a TPS the examples of real-time transaction processing batch transaction processing.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
CS 360 Lecture 8.  The requirements describe the function of a system as seen by the client.  The software team must design a system that will meet.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Auditing Information Systems (AIS)
Faculty of Computer & Information Software Engineering Third year
1 California State University, Fullerton Chapter 10 Business Operations.
Modes of Processing. Transactions  Transactions are events which need to be recorded with the production, sale and distribution of goods and services.
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Chapter 8 Transaction Processing, Electronic Commerce, and Enterprise Resource Planning Systems.
TRANSACTION PROCESSING CYCLE Presented to: Mr. Ahmad Tisman Pasha Presented by: Shafaque Mahmood Roll No
Chapter 17: Client/Server Computing Business Data Communications, 4e.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 14 System Architecture II.
1 CS 501 Spring 2005 CS 501: Software Engineering Lecture 14 System Architecture and Design 2.
CS 5150 Software Engineering Lecture 13 Software Architecture 2.
1 CS 501 Spring 2008 CS 501: Software Engineering Lecture 13 System Architecture and Design I.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 15 System Architecture and Design I.
1 Object-Oriented Analysis and Design with the Unified Process Figure 13-1 Implementation discipline activities.
Security Issues CS 560. Security in the software development process The security goal:  To make sure that agents (people or external systems) who interact.
8-1 Transaction Processing, Innovative Functional Systems, and Supply Chain Integration.
By Jeremy Burdette & Daniel Gottlieb. It is an architecture It is not a technology May not fit all businesses “Service” doesn’t mean Web Service It is.
System Architecture CS 560. Project Design The requirements describe the function of a system as seen by the client. The software team must design a system.
Transaction processing systems
On-Line Transaction Processing
Network Security (the Internet Security)
Managing the IT Function
GENERAL BANK MANAGEMENT Technology Management
Chapter 17: Client/Server Computing
Information system analysis and design
Presentation transcript:

CS 501: Software Engineering Fall 2000 Lecture 14 System Architecture I Data Intensive Systems

2 Administration Midterm examination, October 16, 7:30 to 8:30 p.m. -- Hollister B14 (note change of room) -- See course notices for sample questions

3 System Architecture The overall design of a system: Computers and networks (e.g., monolithic, distributed) Interfaces and protocols (e.g., http, CORBA) Databases (e.g., relational, distributed) Security (e.g., smart card authentication, SSL) Operations (e.g., backup, archiving, audit trails) Software environments (e.g., languages, source control tools)

4 Data Intensive Systems Examples Electricity utility customer billing Telephone company call recording and billing Car rental reservations (e.g., Hertz) Stock market brokerage (e.g., Charles Schwab) Web sales (e.g., Amazon.com)

5 Example 1: Electricity Utility Billing First attempt: Data input Master file Transaction Bill Each transaction handled as it arrives.

6 Criticisms of First Attempt Where is this first attempt weak? The requirements have not been specified!!!

7 Transaction Types Create account / close account Meter reading Payment received Other credits / debits Check cleared / check bounced Account query Correction of error etc., etc., etc.,

8 Typical Requirements All payments to be credited on day received Customers must be able to query account by telephone Cutting off service for non-payment requires management authorization Data input staff should process n transactions per day per person Error rate must be below 0.01% System available 99.9% of business hours

9 Batch Processing: Validation Data input Master file Edit & validation read only errors Validated transactions Incoming transactions

10 Batch Processing: Master File Update Master file update Bills Validated transactions in batches Sort by account errors Reports Instructions

11 Benefits of Batch Updating All transactions for an account are processed together Backup and recovery have fixed checkpoints Better management control of operations Efficient use of staff and hardware

12 Online Inquiry Data input Master file Transactions Bills read only Customer service

13 Example 2: A Small-town Stockbroker Transactions Received by mail or over telephone For immediate or later action Complex customer inquiries Highly competitive market

14 A Database Architecture Database(s): Customer and account database Financial products (e.g., account types, pension plans, savings schemes) External databases (e.g., stock markets, mutual funds, insurance companies)

15 Database Architecture Customer & account database Products & services database External services

16 Real-time Transaction Customer & account database Products & services database External services Real-time transactions

17 Real-time Transactions & Batch Processing Customer & account database Products & services database External services Real-time transactions Batch processing Data input

18 Architectural considerations Real-time service during scheduled hours + batch processing overnight Combine information from several databases Database consistency after any type of failure two-phase commit reload from checkpoint + log detailed audit trail How will transaction errors be avoided? How will transaction errors be corrected?

19 Example: Merger of Two Banks Each bank has a database with its customer accounts. The databases are used by staff at many branches and for back-office processing. The requirement is to integrate the two banks so that they appear to the customers to be a single organization and to provide integrated service from all branches.

20 Merger of Two Banks: Options ??? A B

21 Merger of Two Banks: Architectural Options I. Convert everything to System A. convert databases retrain staff enhance System A (software and hardware) discard System B II. Build an interface between the databases in System A and System B. III. Extend client software so that it can interact with either System A or System B database.

22 Distributed Computing: General Problem An application that is running on one computer wishes to use data or services provided by another: Network connection private, public, or virtual private network location of firewalls Protocols point-to-point, multicast, broadcast message passing, RPC, distributed objects stateful or stateless Quality of service

23 Network Choices Public Internet: Ubiquitous -- worldwide Low cost Private network: Security Predictable performance Choice of protocols (e.g., IBM's SNA)

24 Quality of Network Services Performance Maximum throughput Variations in throughput Real-time media (e.g., audio) Business Suppliers Trouble shooting and maintenance Upgrades

25 Firewall Public network Private network Firewall A firewall is a computer at the junction of two network segments that: Inspects every packet that attempts to cross the boundary Rejects any packet that does not satisfy certain criteria, e.g., an incoming request to open a TCP connection an unknown packet type