LECTURE 2 Database Development Process
LECTURE 2 Database Development Process
Fundamentals of Design,
Implementation, and
Management
Tenth Edition
• Applications
– Transform data into information that forms basis
for decision making
– Usually produce the following:
• Formal report
• Tabulations
• Graphic displays
– Composed of the following two parts:
• Data
• Code: program instructions
4
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
5
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
The Information System (cont’d.)
11
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Implementation
12
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Maintenance
13
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
The Database Life Cycle (DBLC)
• Six phases:
– Database initial study
– Database design
– Implementation and loading
– Testing and evaluation
– Operation
– Maintenance and evolution
14
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
15
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
The Database Initial Study
• Overall purpose:
– Analyze company situation
– Define problems and constraints
– Define objectives
– Define scope and boundaries
• Interactive and iterative processes required to
complete first phase of DBLC successfully
16
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
17
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
The Database Initial Study (cont’d.)
18
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
The Database Initial Study (cont’d.)
19
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
The Database Initial Study (cont’d.)
21
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
22
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
23
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Database Design Strategies
• Top-down design
– Identifies data sets
– Defines data elements for each of those sets
• Definition of different entity types
• Definition of each entity’s attributes
• Bottom-up design
– Identifies data elements (items)
– Groups them together in data sets
24
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
25
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Implementation and Loading
26
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Testing and Evaluation
27
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Testing and Evaluation
(cont’d.)
• Integrity
– Enforced via proper use of primary, foreign key
rules
• Backup and Recovery
– Full backup
– Differential backup
– Transaction log backup
28
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Operation
30
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Maintenance and Evolution (more info)
• Nearly all systems will need maintenance over their lifetime. This is
because:
Something in the system needs fixing (corrective maintenance)
External changes forces a change to the system (adaptive maintenance)
Something can be improved (perfective maintenance)
• There are many reasons for maintaining a system that fall into the
categories given above:
An error / bug is serious enough to need fixing
A new business process needs to be incorporated.
A security weakness in the system has been found and needs fixing.
An user has identified how the system could be improved
The hardware or network is being improved and so the system should
take advantage of that.
31
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Maintenance and Evolution (more info)
Adaptive maintenance
This type of maintenance often occurs as a result of external influences or
strategic changes within the company. The system is being adapted to remain up
to date.
Example 1
• The Government recently changed the VAT rate from 17.5% to 20%. This
change meant that many organizations had to make alterations to their
systems.
Example 2
• A bank decides to offer a new mortgage product. This will have to be included
in the system so that mortgage interest and payments can be calculated.
Example 3
• An company has introduced a online system for customers to place orders.
The online system needs to be integrated into their normal ordering system.
32
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Maintenance and Evolution (more info)
Perfective maintenance
• The system has been in place and running fine for a while.
• However, over time, the end user will often find tweaks or minor improvements which
could be made to improve the way the system works.
33
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Maintenance and Evolution (more info)
Corrective maintenance
• Most systems have imperfections. The initial testing of the system should find many of them but more
obscure errors may only be encountered as users interact with the system day after day.
• Part of the system should include a way for customers / users to report these problems. Also error
logs should be included in the system so maintenance staff can spot problems even if they are not
reported.
Software / programming errors
• Almost all commercial software systems seem to need fixing even after they have been released.
• Software code can be very complex so even the most diligent test regime fails to find all of the errors.
• The way these are fixed is often in the form of a software patch that the user downloads or it is sent to
their computer by the IT staff over the company network..
• Another common corrective maintenance action is to fix security vulnerabilities in the code. Again, the
usual way of doing this is by software patch.
Logical or business process errors
• This is where the system is not behaving in the way it was intended, not because of a programming
error but because the coder misunderstood what was needed to support the business in the first
place.
• For example, a database may be storing data in such a way that it is causing problems for other
systems within the company. These types of errors may be much harder to fix compared to straight
forward programming errors because they may be a fundamental part of the system.
• This is why a robust requirements document is needed to avoid logical and business process errors.
34
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Summary
• Information system facilitates transformation of data
into information
– Manages both data and information
• SDLC traces history (life cycle) of an application within
the information system
• DBLC describes history of database within the
information system
• Database design and implementation process moves
through series of well-defined stages
• Conceptual design subject to several variations:
– Top-down vs. bottom-up
35
© 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition.
May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.