Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,149,697 members, 7,805,861 topics. Date: Tuesday, 23 April 2024 at 07:32 AM

Microstrategy-architecture - Education - Nairaland

Nairaland Forum / Nairaland / General / Education / Microstrategy-architecture (291 Views)

Microstrategy: Longevity And Re-invention / Covenant University's Notable Judeo-Christian Architecture (Photos) / Labour market: No Discrimination Between HND And Bsc In Architecture (2) (3) (4)

(1) (Reply)

Microstrategy-architecture by Ttacy341(f): 11:39am On Oct 05, 2017
Microstrategy Intelligence Server

MicroStrategy Architecture

A MicroStrategy system is built around a three-tier or four-tier structure. The diagram below illustrates a four-tier system.

MicroStrategy metadata

MicroStrategy users need connectivity to the metadata so that they can access projects, create objects, and execute reports. MicroStrategy Intelligence Server connects to the metadata by reading the server definition registry when it starts.

MicroStrategy Metadata

What happens when Intelligence Server starts?

When Intelligence Server starts, it does the following:

Initializes internal processing units
Reads from the machine registry which server definition it is supposed to use and connects to the specified metadata database
Loads configuration and schema information for each loaded project
Loads existing report cache files from automatic backup files into memory for each loaded project (up to the specified maximum RAM setting)
Loads schedules
Loads MDX cube schemas
MicroStrategy Service Manager

At TekSlate, we offer resources that help you in learning various IT courses. We avail both written material and demo
video tutorials. To gain in-depth knowledge and be on par with practical experience,
then explore MicroStrategy Training PDF.
Intelligence Server job processing

The following is a high-level overview of the processing that takes place:

A user makes a request from a client application such as MicroStrategy Web, which sends the request to Intelligence Server.
Intelligence Server determines what type of request it is and performs a variety of functions to prepare for processing.
Depending on the request type, a task list is composed that determines what tasks must be accomplished to complete the job, that is, what components the job has to use within the server that handle things like asking the user to respond to a prompt, retrieving information from the metadata repository, executing SQL against a database, and so on. Each type of request has a different set of tasks in the task list.
The components within Intelligence Server perform different tasks in the task list, such as querying the data warehouse, until a final result is achieved.
Those components are the stops the job makes in what is called a “pipeline,” a path that the job takes as Intelligence Server works on it.
The result is sent back to the client application, which presents the result to the user.
Processing report execution

MicroStrategy - Report Execution

Processing object browsing

MicroStrategy - Processing Object Browsing

MicroStrategy User Model

MicroStrategy users

Like most security architectures, the MicroStrategy security model is built around the concept of a user. To do anything useful with MicroStrategy, a user must log in to the system using a login ID and password. The user can then perform tasks such as creating objects or executing reports and documents, and can generally take advantage of all the other features of the MicroStrategy system.
Users are defined in the MicroStrategy metadata, and exist across projects. You do not have to define users for every project you create in a single metadata repository.
Each user has a unique profile folder in each project. This profile folder appears to the user as the “My Personal Objects” folder. By default other users’ profile folders are hidden. They can be viewed by, in the Desktop Preferences dialog box, in the Desktop: Browsing category, selecting the Display Hidden Objects check box.
Administrator is a built-in default user created with a new MicroStrategy metadata repository. The Administrator user has all privileges and permissions for all projects and all objects.
MicroStrategy user groups

A user group (or “group” for short) is a collection of users. Groups provide a convenient way to manage a large number of users.

Instead of assigning privileges, such as the ability to create reports, to hundreds of users individually, you may assign privileges to a group. Groups may also be assigned permissions to objects, such as the ability to add reports to a particular folder.

Controlling access to objects: Permissions

Permissions define the degree of control users have over individual objects in the system. For example, in the case of a report, a user may have permission to view the report definition and execute the report, but not to modify the report definition or delete the report.

While privileges are assigned to users (either individually, through groups, or with security roles), permissions are assigned to objects.

Controlling access to functionality: Privileges

Privileges give users access to specific MicroStrategy functionality. For example, the Create Metric privilege allows the user to use the Metric Editor to create a new metric, and the Monitor Caches privilege allows the user to view cache information in the Cache Monitor.

Defining sets of privileges: Security roles

A security role is a collection of project-level privileges that are assigned to users and groups. For example, you might have two types of users with different functionality needs: the Executive Users who need to run, sort, and print reports, and the Business Analysts who need additional capabilities to drill and change subtotal definitions. In this case, you can create two security roles to suit these two different types of users.

Modes of Authentication

The available authentication modes are:

Standard: Intelligence Server is the authentication authority. This is the default authentication mode.
Anonymous: Users log in as “Guest” and do not need to provide a password. This authentication mode may be required to enable other authentication modes, such as database warehouse or LDAP.
Database warehouse: The data warehouse database is the authentication authority.
LDAP (lightweight directory access protocol): An LDAP server is the authentication authority Single sign-on: Single sign-on encompasses several different third-party authentication methods, including:
Windows authentication: Windows is the authentication authority o Integrated authentication: A domain controller using Kerberos authentication is the authentication authority
Tivoli or SiteMinder: A third-party single sign-on tool, such as Tivoli or SiteMinder, is the authentication authority.
Managing and verifying your licenses

MicroStrategy uses two main categories of licenses:

Named User licenses in which the number of users with access to specific functionality is restricted.
In a Named User licensing scheme, the privileges given to users and groups determine what licenses are assigned to users and groups. Intelligence Server monitors the number of users in your MicroStrategy system with each privilege, and compares that to the number of available licenses.

CPU licenses, in which the number and speed of the CPUs used by MicroStrategy server products are restricted.
When you purchase licenses in the CPU format, the system monitors the number of CPUs being used by Intelligence Server in your implementation and compares it to the number of licenses that you have. You cannot assign privileges related to certain licenses if the system detects that more CPUs are being used than are licensed. For example, this could happen if you have MicroStrategy Web installed on two dual-processor machines (four CPUs) and you have a license for only two CPUs.

Caching

A cache is a result set that is stored on a system to improve response time in future requests. With caching, users can retrieve results from Intelligence Server rather than re-executing queries against a database.

Intelligence Server supports the following types of caches:

Result caches: Report and document results that have already been calculated and processed, that are stored on the Intelligence Server machine so they can be retrieved more quickly than re-executing the request against the data warehouse.
Report caches can only be created or used for a project if the Enable report server caching check box is selected in the Project Configuration Editor under the Caching: Result Caches: Creation category.
The History List is a way of saving report results on a per-user basis. The History List is a folder where Intelligence Server places report and document results for future reference. Each user has a unique History List.
With the History List, users can:

Keep shortcuts to previously run reports, like the Favorites list when browsing the Internet.
Perform asynchronous report execution. For example, multiple reports can be run at the same time within one browser, or pending reports can remain displayed even after logging out of a project.
Element caches: Most-recently used lookup table elements that are stored in memory on the Intelligence Server or MicroStrategy Desktop machines so they can be retrieved more quickly.
When a user runs a prompted report containing an attribute element prompt or a hierarchy prompt, an element request is created.
Object caches: Most-recently used metadata objects that are stored in memory on the Intelligence Server and MicroStrategy Desktop machines so they can be retrieved more quickly.
When you or any users browse an object definition (attribute, metric, and so on), you create what is called an object cache. An object cache is a recently used object definition stored in memory on MicroStrategy Desktop and MicroStrategy Intelligence Server.

Scheduling

Scheduling is a feature of MicroStrategy Intelligence Server that you can use to automate various tasks. Time-sensitive, time-consuming, repetitive, and bulk tasks are ideal candidates for scheduling. Running a report or document is the most commonly scheduled task since scheduling reports, in conjunction with other features such as caching and clustering, can improve the overall performance of the system.

Time-Triggered and Event – Triggered

With a time-triggered schedule, you define a specific date and time at which the scheduled task is to be run. For example, you can execute a particular task every Sunday night at midnight. Time-triggered schedules are useful to allow large, resource-intensive tasks to run at off-peak times, such as overnight or over a weekend.

An event-triggered schedule causes tasks to occur when a specific event occurs. For example, an event may trigger when the database is loaded, or when the books are closed at the end of a cycle.

Clustering

A clustered set of machines provides a related set of functionality or services to a common set of users. MicroStrategy recommends clustering Intelligence Servers in environments where access to the data warehouse is mission-critical and system performance is of utmost importance.

A cluster is a group of two or more servers connected to each other in such a way that they behave like a single server. Each machine in the cluster is called a node. Because each machine in the cluster runs the same services as other machines in the cluster, any machine can stand in for any other machine in the cluster.

Failover support
Load balancing
Project distribution and project failover
MicroStrategy - Clustering

How Microstrategy Desktop Works?

MICROSTRATEGY DESKTOP

The MicroStrategy Desktop interface has three panes:

Folder List: Where all the project folders that hold your reports and report-related objects are accessible. The Folder List displays all the project sources, projects, application and schema object folders, and the administrative functions for your business intelligence system. When all panes are displayed, the Folder List is the center pane of the Desktop interface.

If the Folder List does not automatically appear when you log in to MicroStrategy Desktop, from the View menu select Folder List.

Object Viewer: Where the contents of each folder, such as reports or report objects, are displayed as you browse through folders in the Folder List. The right pane of the MicroStrategy Desktop interface is the Object Viewer.

Shortcut Bar: This pane contains icons that allow you instant access to your favorite or most frequently used folders. Simply click on a shortcut icon to jump immediately to the folder to which it is linked. You can create a shortcut to any folder that appears in your Folder List. You can add or remove shortcuts at any time.

Navigating through Desktop

Use the following menus and tools in MicroStrategy Desktop to access the different reporting features of MicroStrategy.

From the Desktop menus, you can do the following.

Microstrategy desktop

From the Desktop toolbar, you can do the following:

MicroStrategy Desktop Toolbar

Report Editor Interface

Screenshot_40

Report Objects pane: (top left) This pane appears only if you have the MicroStrategy OLAP Services product. Where you can see a summary of all the objects you have included on your report.

There may be more objects in this pane than are displayed on the executed report, because OLAP Services lets analysts quickly remove or add objects from this pane directly to the report template. When the report is executed, the MicroStrategy Engine generates SQL that includes all the objects in this Report Objects pane, not just the objects that are displayed in the report after it is executed.

Object Browser pane: (center left) Where you navigate through the project to locate objects to include on the report.

My Shortcuts pane: (bottom left) Enables you to access any folder in the Object Browser quickly. Creating shortcuts can save you time if you repeatedly browse to the same folders.

View Filter pane: (top right) Where you apply a special kind of filter to any object that is in the Report Objects pane. View filters do not modify the SQL for the report like normal report filters do. Instead, view filters are applied to the overall result set after the SQL is executed and results are returned from the data source. This can help improve report execution performance.

Report Filter pane: (center right) Where you add filtering conditions to a report. Filtering conditions can be made up of attributes, metrics, advanced filter qualifications, and shortcuts to an existing report filter. The Report Filter pane allows you to create a filter without having to open a separate object editor (the Filter Editor). Simple filters can be conveniently created by dragging and dropping objects from the Object Browser into this pane to create a filter.

Report View pane: (bottom right) Where you define your report layouts by dragging and dropping objects from the Object Browser onto this report view pane. You can create a report to serve as a template for other reports;

Page-by pane: (top of Report View pane) Where you place subsets of your report results to be displayed as separate pages of the executed report.

Project objects

Screenshot_41

Attributes

Attributes are the business concepts reflected in your stored business data in your data source. Attributes provide a context in which to report on and analyze business facts or calculations. Attributes are created by the project designer when an organization’s project is first created.

Metrics

Metrics are MicroStrategy objects that represent business measures and key performance indicators. From a practical perspective, metrics are the calculations performed on data stored in your database, the results of which are displayed on a report.

Specifically, metrics define the analytical calculations to be performed against data that is stored in the data source. A metric is made up of data source facts and the mathematical operations to be performed on those facts, so that meaningful business analysis can be performed on the results.

Metric creation is usually the responsibility of advanced analysts.

Metric Editor:

Screenshot_42

Check out the top Advanced MicroStrategy Interview Questions now!
You use the Metric Editor to create and save metrics, and to edit existing metrics. The Metric Editor is accessible from MicroStrategy Desktop and is shown in the image above.

(1) (Reply)

F-1 To H1B Visa In Silicon Valley / Sleemut Tutor Provides ADULT EDUCATION Service...available In Ibadan / Study Abroad

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 53
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.