Write a research paper on Comparative Analysis of DBMS Functions.

Research Paper on Comparative Analysis of DBMS Functions This is an in-depth technical comparative analysis not a sales pitch, so be sure that you give a clear presentation of the strengths and weaknesses of selected DBMSs for the given DBMS functions. You may utilize material from referenced documentation on the relevant DBMS but should not plagiarize (Check Appendix 4, section Course Policies on Plagiarism and Academic Honesty).
The length of the body (i.e. 3 – 8 below) of the Research Paper should be between approximately 10-15 pages with 1” margins and spacing of 1½ lines, and 12 point font.
The structure of the Research Paper should be as follows:
1.Executive summary
2.Introduction: a.Objectives b.List of two enterprise DBMS software that are covered c.List the DBMS function (i.e. Transaction Management and Concurrency Control (TM&CC), Backup and Recovery (B&R), or Security) that are covered in the paper d.Limitations of the paper
3.Overview on selected DBMS softwarea.Overview on DBMS software 1 b.Overview on DBMS software 2
4.Transaction Management (TM) and Concurrency Control (CC):a.Overview of TM&CC (i.e.isolation levels, CC mechanism, locking mechanism); DBMS Software 1: Your description of approach to the overview of TM&CC.b.DBMS Software 2: Your description of approach to the overview of TM&CC.c.Your comparison of the two DBMS software’s approach to the TM&CC.4.(Or) Backup and Recovery (B&R):a.Overview of B&R (i.e.types of failures and actions, components and structures used in recovery, backup and recovery options); b.DBMS Software 1: Your description of approach to the overview of B&R.c.DBMS Software 2: Your description of approach to the overview of B&R.d.Your comparison of the two DBMS software’s approach to the B&R.4.(Or) Security:a.Overview of Security(i.e.authentication, authorization and privileges, database encryption, and auditing); b.DBMS Software 1: Your description of approach to the overview of Security.c.DBMS Software 2: Your description of approach to the overview of Security.d.Your comparison of the two DBMS software’s approach to the Security. 5.Conclusion a.Concluding comments b.What you learned 6.List of References

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: