SlideShare une entreprise Scribd logo
1  sur  27
Model I: Introduction to
         DBMS
Contents
Definition of DBMS
Data Independence
DBMS Architecture, Levels
Database Administrator
File System Approach Vs DBMS Approach
Advantages of Using a DBMS
Data Models
Schemas, and Instances.
Basic Definitions
• Database: A collection of related data.
• Data: Known facts that can be recorded and have
  an implicit meaning.
• Mini-world: Some part of the real world about
  which data is stored in a database. For example,
  student grades and transcripts at a university.
• Database Management System (DBMS): A
  software package/ system to facilitate the
  creation and maintenance of a computerized
  database.
• Database System: The DBMS software together
  with the data itself. Sometimes, the applications
  are also included.
Typical DBMS Functionality
• Define a database : in terms of data types,
  structures and constraints
• Construct or Load the Database on a
  secondary storage medium
• Manipulating the database : querying,
  generating reports, insertions, deletions
  and modifications to its content
• Concurrent Processing and Sharing by a
  set of users and programs – yet, keeping all
  data valid and consistent
Typical DBMS Functionality
Other features:
  – Protection or Security measures to
    prevent unauthorized access
  – “Active” processing to take internal
    actions on data
  – Presentation and Visualization of data
Example of a Database
 (with a Conceptual Data Model)
• Mini-world for the example: Part of a
  UNIVERSITY environment.
• Some mini-world entities:
  –   STUDENTs
  –   COURSEs
  –   SECTIONs (of COURSEs)
  –   (academic) DEPARTMENTs
  –   INSTRUCTORs
Note: The above could be expressed in the
 ENTITY-RELATIONSHIP data model.
Example of a Database
•
    (withmini-world relationships: Model)
    Some
          a Conceptual Data
    –   SECTIONs are of specific COURSEs
    –   STUDENTs take SECTIONs
    –   COURSEs have prerequisite COURSEs
    –   INSTRUCTORs teach SECTIONs
    –   COURSEs are offered by DEPARTMENTs
    –   STUDENTs major in DEPARTMENTs

Note: The above could be expressed in the
 ENTITY-RELATIONSHIP data model.
Main Characteristics of the
       Database Approach
• Self-describing nature of a database system:
  A DBMS catalog stores the description of the
  database. The description is called meta-
  data). This allows the DBMS software to work
  with different databases.
• Insulation between programs and data: Called
  program-data independence. Allows
  changing data storage structures and
  operations without having to change the
  DBMS access programs.
Main Characteristics of the
       Database Approach
• Data Abstraction: A data model is used to
  hide storage details and present the users
  with a conceptual view of the database.
• Support of multiple views of the data: Each
  user may see a       different view of the
  database, which describes only the data of
  interest to that user.
Main Characteristics of the
       Database Approach
• Sharing of data and multiuser transaction
  processing : allowing a set of concurrent users
  to retrieve and to update the database.
  Concurrency control within the DBMS
  guarantees that each transaction is correctly
  executed or completely aborted. OLTP (Online
  Transaction Processing) is a major part of
  database applications.
Three-Schema Architecture
• Proposed to support DBMS characteristics
  of:
  • Program-data independence.
  • Support of multiple views of the data.
Three-Schema Architecture
• Defines DBMS schemas at three levels:
  • Internal schema at the internal level to describe
    physical storage structures and access paths.
    Typically uses a physical data model.
  • Conceptual schema at the conceptual level to
    describe the structure and constraints for the whole
    database for a community of users. Uses a
    conceptual or an implementation data model.
  • External schemas at the external level to describe
    the various user views. Usually uses the same data
    model as the conceptual level.
Three-Schema Architecture
Mappings among schema levels are
 needed to transform requests and data.
 Programs refer to an external schema,
 and are mapped by the DBMS to the
 internal schema for execution.
Data Independence
• Logical Data Independence: The
  capacity to change the conceptual
  schema without having to change the
  external schemas and their application
  programs.
• Physical Data Independence: The
  capacity to change the internal schema
  without having to change the conceptual
  schema.
Data Independence
When a schema at a lower level is changed,
 only the mappings between this schema
 and higher-level schemas need to be
 changed in a DBMS that fully supports
 data independence. The higher-level
 schemas themselves are unchanged.
 Hence, the application programs need not
 be changed since they refer to the
 external schemas.
DBMS Languages
• Data Definition Language (DDL): Used by the
  DBA and database designers to specify the
  conceptual schema of a database. In many
  DBMSs, the DDL is also used to define internal
  and external schemas (views). In some DBMSs,
  separate storage definition language (SDL)
  and view definition language (VDL) are used
  to define internal and external schemas.
Database Users
Users may be divided into those who
 actually use and control the content
 (called “Actors on the Scene”) and those
 who enable the database to be developed
 and the DBMS software to be designed
 and implemented (called “Workers Behind
 the Scene”).
Database Users
Actors on the scene
  – Database administrators: responsible for
    authorizing access to the database, for co-
    ordinating and monitoring its use, acquiring
    software, and hardware resources, controlling
    its use and monitoring efficiency of
    operations.
  – Database Designers: responsible to define
    the content, the structure, the constraints, and
    functions or transactions against the
    database. They must communicate with the
    end-users and understand their needs.
  – End-users: they use the data for queries,
    reports and some of them actually update the
    database content.
Categories of End-users
• Casual : access database occasionally
  when needed
• Naïve or Parametric : they make up a
  large section of the end-user population.
  They use previously well-defined functions
  in the form of “canned transactions”
  against the database. Examples are bank-
  tellers or reservation clerks who do this
  activity for an entire shift of operations.
Categories of End-users
• Sophisticated : these include business
  analysts, scientists, engineers, others
  thoroughly familiar with the system
  capabilities. Many use tools in the form of
  software packages that work closely with the
  stored database.
• Stand-alone : mostly maintain personal
  databases using ready-to-use packaged
  applications. An example is a tax program
  user that creates his or her own internal
  database.
Advantages of Using the
       Database Approach
• Controlling redundancy in data storage
  and in development and maintenence
  efforts.
• Sharing of data among multiple users.
• Restricting unauthorized access to data.
• Providing persistent storage for program
  Objects (in Object-oriented DBMS’s – see
  Chs. 20-22)
• Providing Storage Structures for efficient
  Query Processing
Advantages of Using the
       Database Approach
• Providing backup and recovery
  services.
• Providing multiple interfaces to
  different classes of users.
• Representing complex relationships
  among data.
• Enforcing integrity constraints on the
  database.
• Drawing Inferences and Actions using
  rules
Data Models
• Data Model: A set of concepts to describe the
  structure of a database, and certain constraints
  that the database should obey.
• Data Model Operations: Operations for
  specifying database retrievals and updates by
  referring to the concepts of the data model.
  Operations on the data model may include basic
  operations and user-defined operations.
Categories of data models
• Conceptual (high-level, semantic) data
  models: Provide concepts that are close to the
  way many users perceive data. (Also called
  entity-based or object-based data models.)
• Physical (low-level, internal) data models:
  Provide concepts that describe details of how
  data is stored in the computer.
• Implementation (representational) data
  models: Provide concepts that fall between the
  above two, balancing user views with some
  computer storage details.
Hierarchical Model

• ADVANTAGES:
  • Hierarchical Model is simple to construct and operate
    on
  • Corresponds to a number of natural hierarchically
    organized domains - e.g., assemblies in manufacturing,
    personnel organization in companies
  • Language is simple; uses constructs like GET, GET
    UNIQUE, GET NEXT, GET NEXT WITHIN PARENT
    etc.
• DISADVANTAGES:
  • Navigational and procedural nature of processing
  • Database is visualized as a linear arrangement of
    records
Network Model
• ADVANTAGES:
  • Network Model is able to model complex relationships
    and represents semantics of add/delete on the
    relationships.
  • Can handle most situations for modeling using record
    types and relationship types.
  • Language is navigational; uses constructs like FIND,
    FIND member, FIND owner, FIND NEXT within set, GET
    etc. Programmers can do optimal navigation through the
    database.
• DISADVANTAGES:
  • Navigational and procedural nature of processing
  • Database contains a complex array of pointers that
    thread through a set of records.
Schemas versus Instances
• Database Schema: The description of a
  database. Includes descriptions of the
  database structure and the constraints that
  should hold on the database.
• Schema Diagram: A diagrammatic display of
  (some aspects of) a database schema.
• Schema Construct: A component of the
  schema or an object within the schema, e.g.,
  STUDENT, COURSE.
• Database Instance: The actual data stored in
  a database at a particular moment in time.
  Also called database state (or occurrence).

Contenu connexe

Similaire à 9a797dbms chapter1 b.sc2

Module 1 - Chapter 2.pptx
Module 1 - Chapter 2.pptxModule 1 - Chapter 2.pptx
Module 1 - Chapter 2.pptxSoniaDevi15
 
CS3270 - DATABASE SYSTEM - Lecture (1)
CS3270 - DATABASE SYSTEM -  Lecture (1)CS3270 - DATABASE SYSTEM -  Lecture (1)
CS3270 - DATABASE SYSTEM - Lecture (1)Dilawar Khan
 
01-Database Administration and Management.pdf
01-Database Administration and Management.pdf01-Database Administration and Management.pdf
01-Database Administration and Management.pdfTOUSEEQHAIDER14
 
Database management system.pptx
Database management system.pptxDatabase management system.pptx
Database management system.pptxAshmitKashyap1
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Surya Swaroop
 
Adbms 3 main characteristics of the database approach
Adbms 3 main characteristics of the database approachAdbms 3 main characteristics of the database approach
Adbms 3 main characteristics of the database approachVaibhav Khanna
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxMEGHANA508383
 
Week 1 and 2 Getting started with DBMS.pptx
Week 1 and 2 Getting started with DBMS.pptxWeek 1 and 2 Getting started with DBMS.pptx
Week 1 and 2 Getting started with DBMS.pptxRiannel Tecson
 
DBMS architecture &; system structure
DBMS architecture &; system  structureDBMS architecture &; system  structure
DBMS architecture &; system structureRUpaliLohar
 

Similaire à 9a797dbms chapter1 b.sc2 (20)

SQL- Data Base
SQL- Data BaseSQL- Data Base
SQL- Data Base
 
Ch1_Intro-95(1).ppt
Ch1_Intro-95(1).pptCh1_Intro-95(1).ppt
Ch1_Intro-95(1).ppt
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMS
 
Module 1 - Chapter 2.pptx
Module 1 - Chapter 2.pptxModule 1 - Chapter 2.pptx
Module 1 - Chapter 2.pptx
 
PHP/MySQL First Session Material
PHP/MySQL First Session MaterialPHP/MySQL First Session Material
PHP/MySQL First Session Material
 
CS3270 - DATABASE SYSTEM - Lecture (1)
CS3270 - DATABASE SYSTEM -  Lecture (1)CS3270 - DATABASE SYSTEM -  Lecture (1)
CS3270 - DATABASE SYSTEM - Lecture (1)
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Lecture 1 =Unit 1 Part 1.ppt
Lecture 1 =Unit 1 Part 1.pptLecture 1 =Unit 1 Part 1.ppt
Lecture 1 =Unit 1 Part 1.ppt
 
Unit 1 dbms
Unit 1 dbmsUnit 1 dbms
Unit 1 dbms
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
01-Database Administration and Management.pdf
01-Database Administration and Management.pdf01-Database Administration and Management.pdf
01-Database Administration and Management.pdf
 
INTRODUCTION TO DATABASE
INTRODUCTION TO DATABASEINTRODUCTION TO DATABASE
INTRODUCTION TO DATABASE
 
Database management system.pptx
Database management system.pptxDatabase management system.pptx
Database management system.pptx
 
En ch01
En ch01En ch01
En ch01
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)
 
unit 1.pdf
unit 1.pdfunit 1.pdf
unit 1.pdf
 
Adbms 3 main characteristics of the database approach
Adbms 3 main characteristics of the database approachAdbms 3 main characteristics of the database approach
Adbms 3 main characteristics of the database approach
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
 
Week 1 and 2 Getting started with DBMS.pptx
Week 1 and 2 Getting started with DBMS.pptxWeek 1 and 2 Getting started with DBMS.pptx
Week 1 and 2 Getting started with DBMS.pptx
 
DBMS architecture &; system structure
DBMS architecture &; system  structureDBMS architecture &; system  structure
DBMS architecture &; system structure
 

Plus de Mukund Trivedi (20)

System development life cycle (sdlc)
System development life cycle (sdlc)System development life cycle (sdlc)
System development life cycle (sdlc)
 
Process of design
Process of designProcess of design
Process of design
 
New file and form 2
New file and form 2New file and form 2
New file and form 2
 
File organisation
File organisationFile organisation
File organisation
 
Evaluation
EvaluationEvaluation
Evaluation
 
Database
DatabaseDatabase
Database
 
Case tools
Case toolsCase tools
Case tools
 
Evaluation
EvaluationEvaluation
Evaluation
 
Dfd final
Dfd finalDfd final
Dfd final
 
Sad
SadSad
Sad
 
C++ file
C++ fileC++ file
C++ file
 
Ff40fnatural resources (1)
Ff40fnatural resources (1)Ff40fnatural resources (1)
Ff40fnatural resources (1)
 
Ff40fnatural resources
Ff40fnatural resourcesFf40fnatural resources
Ff40fnatural resources
 
F58fbnatural resources 2 (1)
F58fbnatural resources 2 (1)F58fbnatural resources 2 (1)
F58fbnatural resources 2 (1)
 
F58fbnatural resources 2
F58fbnatural resources 2F58fbnatural resources 2
F58fbnatural resources 2
 
F6dc1 session6 c++
F6dc1 session6 c++F6dc1 session6 c++
F6dc1 session6 c++
 
Ee2fbunit 7
Ee2fbunit 7Ee2fbunit 7
Ee2fbunit 7
 
E212d9a797dbms chapter3 b.sc2 (2)
E212d9a797dbms chapter3 b.sc2 (2)E212d9a797dbms chapter3 b.sc2 (2)
E212d9a797dbms chapter3 b.sc2 (2)
 
E212d9a797dbms chapter3 b.sc2 (1)
E212d9a797dbms chapter3 b.sc2 (1)E212d9a797dbms chapter3 b.sc2 (1)
E212d9a797dbms chapter3 b.sc2 (1)
 
E212d9a797dbms chapter3 b.sc2
E212d9a797dbms chapter3 b.sc2E212d9a797dbms chapter3 b.sc2
E212d9a797dbms chapter3 b.sc2
 

Dernier

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 

Dernier (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 

9a797dbms chapter1 b.sc2

  • 2. Contents Definition of DBMS Data Independence DBMS Architecture, Levels Database Administrator File System Approach Vs DBMS Approach Advantages of Using a DBMS Data Models Schemas, and Instances.
  • 3. Basic Definitions • Database: A collection of related data. • Data: Known facts that can be recorded and have an implicit meaning. • Mini-world: Some part of the real world about which data is stored in a database. For example, student grades and transcripts at a university. • Database Management System (DBMS): A software package/ system to facilitate the creation and maintenance of a computerized database. • Database System: The DBMS software together with the data itself. Sometimes, the applications are also included.
  • 4. Typical DBMS Functionality • Define a database : in terms of data types, structures and constraints • Construct or Load the Database on a secondary storage medium • Manipulating the database : querying, generating reports, insertions, deletions and modifications to its content • Concurrent Processing and Sharing by a set of users and programs – yet, keeping all data valid and consistent
  • 5. Typical DBMS Functionality Other features: – Protection or Security measures to prevent unauthorized access – “Active” processing to take internal actions on data – Presentation and Visualization of data
  • 6. Example of a Database (with a Conceptual Data Model) • Mini-world for the example: Part of a UNIVERSITY environment. • Some mini-world entities: – STUDENTs – COURSEs – SECTIONs (of COURSEs) – (academic) DEPARTMENTs – INSTRUCTORs Note: The above could be expressed in the ENTITY-RELATIONSHIP data model.
  • 7. Example of a Database • (withmini-world relationships: Model) Some a Conceptual Data – SECTIONs are of specific COURSEs – STUDENTs take SECTIONs – COURSEs have prerequisite COURSEs – INSTRUCTORs teach SECTIONs – COURSEs are offered by DEPARTMENTs – STUDENTs major in DEPARTMENTs Note: The above could be expressed in the ENTITY-RELATIONSHIP data model.
  • 8. Main Characteristics of the Database Approach • Self-describing nature of a database system: A DBMS catalog stores the description of the database. The description is called meta- data). This allows the DBMS software to work with different databases. • Insulation between programs and data: Called program-data independence. Allows changing data storage structures and operations without having to change the DBMS access programs.
  • 9. Main Characteristics of the Database Approach • Data Abstraction: A data model is used to hide storage details and present the users with a conceptual view of the database. • Support of multiple views of the data: Each user may see a different view of the database, which describes only the data of interest to that user.
  • 10. Main Characteristics of the Database Approach • Sharing of data and multiuser transaction processing : allowing a set of concurrent users to retrieve and to update the database. Concurrency control within the DBMS guarantees that each transaction is correctly executed or completely aborted. OLTP (Online Transaction Processing) is a major part of database applications.
  • 11. Three-Schema Architecture • Proposed to support DBMS characteristics of: • Program-data independence. • Support of multiple views of the data.
  • 12. Three-Schema Architecture • Defines DBMS schemas at three levels: • Internal schema at the internal level to describe physical storage structures and access paths. Typically uses a physical data model. • Conceptual schema at the conceptual level to describe the structure and constraints for the whole database for a community of users. Uses a conceptual or an implementation data model. • External schemas at the external level to describe the various user views. Usually uses the same data model as the conceptual level.
  • 13. Three-Schema Architecture Mappings among schema levels are needed to transform requests and data. Programs refer to an external schema, and are mapped by the DBMS to the internal schema for execution.
  • 14. Data Independence • Logical Data Independence: The capacity to change the conceptual schema without having to change the external schemas and their application programs. • Physical Data Independence: The capacity to change the internal schema without having to change the conceptual schema.
  • 15. Data Independence When a schema at a lower level is changed, only the mappings between this schema and higher-level schemas need to be changed in a DBMS that fully supports data independence. The higher-level schemas themselves are unchanged. Hence, the application programs need not be changed since they refer to the external schemas.
  • 16. DBMS Languages • Data Definition Language (DDL): Used by the DBA and database designers to specify the conceptual schema of a database. In many DBMSs, the DDL is also used to define internal and external schemas (views). In some DBMSs, separate storage definition language (SDL) and view definition language (VDL) are used to define internal and external schemas.
  • 17. Database Users Users may be divided into those who actually use and control the content (called “Actors on the Scene”) and those who enable the database to be developed and the DBMS software to be designed and implemented (called “Workers Behind the Scene”).
  • 18. Database Users Actors on the scene – Database administrators: responsible for authorizing access to the database, for co- ordinating and monitoring its use, acquiring software, and hardware resources, controlling its use and monitoring efficiency of operations. – Database Designers: responsible to define the content, the structure, the constraints, and functions or transactions against the database. They must communicate with the end-users and understand their needs. – End-users: they use the data for queries, reports and some of them actually update the database content.
  • 19. Categories of End-users • Casual : access database occasionally when needed • Naïve or Parametric : they make up a large section of the end-user population. They use previously well-defined functions in the form of “canned transactions” against the database. Examples are bank- tellers or reservation clerks who do this activity for an entire shift of operations.
  • 20. Categories of End-users • Sophisticated : these include business analysts, scientists, engineers, others thoroughly familiar with the system capabilities. Many use tools in the form of software packages that work closely with the stored database. • Stand-alone : mostly maintain personal databases using ready-to-use packaged applications. An example is a tax program user that creates his or her own internal database.
  • 21. Advantages of Using the Database Approach • Controlling redundancy in data storage and in development and maintenence efforts. • Sharing of data among multiple users. • Restricting unauthorized access to data. • Providing persistent storage for program Objects (in Object-oriented DBMS’s – see Chs. 20-22) • Providing Storage Structures for efficient Query Processing
  • 22. Advantages of Using the Database Approach • Providing backup and recovery services. • Providing multiple interfaces to different classes of users. • Representing complex relationships among data. • Enforcing integrity constraints on the database. • Drawing Inferences and Actions using rules
  • 23. Data Models • Data Model: A set of concepts to describe the structure of a database, and certain constraints that the database should obey. • Data Model Operations: Operations for specifying database retrievals and updates by referring to the concepts of the data model. Operations on the data model may include basic operations and user-defined operations.
  • 24. Categories of data models • Conceptual (high-level, semantic) data models: Provide concepts that are close to the way many users perceive data. (Also called entity-based or object-based data models.) • Physical (low-level, internal) data models: Provide concepts that describe details of how data is stored in the computer. • Implementation (representational) data models: Provide concepts that fall between the above two, balancing user views with some computer storage details.
  • 25. Hierarchical Model • ADVANTAGES: • Hierarchical Model is simple to construct and operate on • Corresponds to a number of natural hierarchically organized domains - e.g., assemblies in manufacturing, personnel organization in companies • Language is simple; uses constructs like GET, GET UNIQUE, GET NEXT, GET NEXT WITHIN PARENT etc. • DISADVANTAGES: • Navigational and procedural nature of processing • Database is visualized as a linear arrangement of records
  • 26. Network Model • ADVANTAGES: • Network Model is able to model complex relationships and represents semantics of add/delete on the relationships. • Can handle most situations for modeling using record types and relationship types. • Language is navigational; uses constructs like FIND, FIND member, FIND owner, FIND NEXT within set, GET etc. Programmers can do optimal navigation through the database. • DISADVANTAGES: • Navigational and procedural nature of processing • Database contains a complex array of pointers that thread through a set of records.
  • 27. Schemas versus Instances • Database Schema: The description of a database. Includes descriptions of the database structure and the constraints that should hold on the database. • Schema Diagram: A diagrammatic display of (some aspects of) a database schema. • Schema Construct: A component of the schema or an object within the schema, e.g., STUDENT, COURSE. • Database Instance: The actual data stored in a database at a particular moment in time. Also called database state (or occurrence).