Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views8 pages

DBMS Week1

Egegeg

Uploaded by

popppp907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views8 pages

DBMS Week1

Egegeg

Uploaded by

popppp907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

WEEK—1 Lecture-3 hr

Introduction
1 Overview of DB
Introduction: - Database is a collection of related data. The related data may represent name, telephone, number, and
address of person.
DBMS: -DBMS is a collection of programs that enables users to create and maintain a database.
DBMS is general purpose s/w system that facilitates process of defining, constructing, manipulating, and sharing databases
among various users and applications
Defining: - A database involves specifying the data type, structures, and constraints for the data to be stored in the
database.
Constructing: - The database is the process of storing the data on some storage medium.
Manipulating: - A database includes modifying (adding, deleting, and updating) data to database.
Sharing: - A database allows multiple users to use the data concurrently.

2 Why a database? Purpose of database


A database-management system (DBMS) is a collection of interrelated data and a set of programs to access those data.
The primary goal of a DBMS is to provide a way to store and retrieve database information that is both convenient and
efficient.
Management of data involves both defining structures for storage of information and providing mechanisms for the
manipulation of information.
In addition, the database system must ensure the safety of the information stored, despite system crashes or attempts at
unauthorized access.

Purpose:
1. To Access is about making data available to users.
Large volumes of data can be stored in one place and Multiple users can read and modify the data at the same time
2. To ensure the integrity of a database.
3. Security: Databases can be made very secure, and that includes the ability to have access rights to specific parts of
the database and not others.

3 Classification- Classification of Database Management System

Classification of DBMS

The following criteria are normally used to classify DBMSs.


• Data model
• Number of users
• Number of sites
• Cost

❖ Based on the Data model being used the DBMS is classified as follows:
➢ Hierarchical data model
▪ Hierarchical data model represents data as hierarchical tree structure.
▪ There is no standard language for the hierarchical model; most hierarchical DBMS have record-at-time
languages
▪ Legacy applications still run on database systems based on the hierarchical and network data models.
➢ Relational data model
▪ Stores data in the form of a table.
▪ A relation database is a data driven not design driven
▪ Maintaining consistency among all applications is easier
▪ It supports power query language SQL.

➢ Object-Oriented model
▪ It is based on the collection of objects
▪ This database manages objects for multimedia applications and manages data with complex relationships that
are difficult to model and process in a RDBMS.

➢ Object-relational DBMS
▪ Relational DBMS have been extending their model to incorporate object database concepts and other
capabilities

❖ Based on number of users, DBMS can be classified as follows:

➢ Single-user systems support only one user at a time and are mostly used with PCs.
➢ Multiuser systems which include the majority of DBMSs, support concurrent multiple users.

❖ Based on number of Sites DBMS can be classified as follows:


➢ Centralized DBMS
▪ A DBMS is centralized if the data is stored at a single computer site.
▪ A centralized DBMS can support multiple users, but the DBMS and the database reside totally at a
single computer site.

➢ Distributed DBMS
▪ A distributed DBMS (DDBMS) can have the actual database and DBMS software distributed over
many sites, connected by a computer network.

❖ Based on the cost DBMS can be classified as follows:
➢ The DBMS package cost between $10000 to 100000
➢ Single user work with micro computers cost between $100 and $3000
➢ Other few elaborate packages cost more than $10000.

4 Application
Application and Uses of Database Management System (DBMS)

• Railway Reservation System. The database is required to keep record of ticket booking, train departure, and arrival status.
• Library Management System.

• Banking.

• Universities and colleges.

• Credit card transactions.

• Social Media Sites.

• Telecommunications

• Finance.

5 DBMS: Features- Features of Database Management System (DBMS)

• Minimum Duplication and Redundancy. Because there are many users who use the database so chances of data duplicity
are very high.

• Saves Storage Space and Cost.

• Anyone Can Work on It.

• Large Database Maintenance.

• Provides High Level of Security.

• Permanent Storage of Data.

6 DBMS: features, providers


Characteristics of database approach
1. Self-Describing Nature of a Database System: -The database system contains not only the database itself but also
a complete definition or description of the database structure and constraints.
This definition is stored is the DBMS catalog, which contains information like structure, type, and storage format
of each data.
2. Insulation between programs and data: - In database systems, the data is stored independently from the programs
that access it. That is, you can modify data without need to any changes in the programs this property is called
program operation independence.
3. Support of multiple views of the data: -Database is shared among multiple users, each user may require different
information based on their requirement from the database. each user requirement is the view of database.
4. Sharing of data and transaction processing: - A multiuser DBMS allows access to database simultaneously by
more than one user at the same time using concurrency control software.
5. Security: -features like multiple views offer security to some extent. DBMS offers methods to improve security
by using constraints while entering data into the database and retrieving the same at a later stage
6. Query language: - query language makes it more efficient to retrieve and manipulate data. user can apply as many
and as different filtering option as required.

7 Functional components of DBMS


Figure illustrates the typical DBMS components in a simplified form. The figure is divided into two parts.

• The top part of the figure refers to the various users of the database environment and their interfaces.
• The lower part shows the internals of the DBMS responsible for storage of data and processing of transactions.

DBMS Components modules are:


• Stored data manager
• DDL compiler
• Interactive query interface
o Query compiler
o Query optimizer
• Precompiler
• Runtime database processor
• System catalog
• Concurrency control system
• Backup and recovery system

Stored data manager:


➢ Storage manager is a program module that provides the interface between the low-level data stored in the
database and the application programs and queries submitted to the system.
➢ The storage manager is responsible for efficient storing, retrieving and updating of data.
➢ The dotted lines and circle shows access that are under the control of this stored data manager.

DDL Compiler:
➢ The DDL compiler processes schema definitions, specified in the DDL, and stores descriptions of the schemas
(meta-data) in the DBMS catalog.

Interactive Query Interface:


➢ This interface may be used to generate the interactive query automatically. These queries are parsed and validated
for correctness of the query syntax by a query compiler that compiles them into an internal form.
➢ This internal query is subjected to query optimization. The query optimizer is concerned with the rearrangement
and possible reordering of operations, elimination of redundancies, and use of correct algorithms and indexes
during execution.

Pre-complier:
➢ The pre-compiler extracts DML commands from an application program written in a host programming
language.
➢ These commands are sent to the DML compiler for compilation into object code for database access. The rest of
the program is sent to the host language compiler.
➢ The object codes for the DML commands and the rest of the program are linked, forming a canned transaction
whose executable code includes calls to the runtime database processor

Runtime database processor:


➢ Runtime Database Processor executes
✓ The privileged commands,
✓ The executable query plans, and
✓ The canned transactions with runtime parameters.

Concurrency Control System:


➢ Concurrency control (CC) is a process to ensure that data is updated correctly and appropriately when multiple
transactions are concurrently executed in DBMS Backup and Recovery System.

A database backup operation is performed by backup system, when a problem that damages the database , all committed
data is recovered by recovery subsystem

8 Types of DBMS architecture


Centralized and client/server architectures for DBMS

i. Centralized DBMS architecture

Centralized DBMS combines everything into single system including DBMS software, hardware, application programs
and user interface processing software.
User can connect through a remote terminal. However, all processing is done at centralized site

Basic client server architectures.


In client server architecture many pc’s, workstation, file servers, printers, database servers, web servers etc are connected
via a network.
A client is a user m/c provides user interface facilities and local processing .it send requests to server to get some services.
A server is a machine that can provides services to the client machines such as file access, printing etc.
It defines specialized servers with specific functions
File server: -which maintains the files of the several client’s machines
Print server: -which have several printers connected to it and accepts request for print by all the clients.
Web server: -which provides web services to all the clients’ machine.

a) Two tier client/server architecture

In this user interface programs and application programs can run on the client ride. When DBMS access is required, the
program establishes a connection to the DBMS server through ODBC open database connectivity.

This architecture is called two tier architectures because the software components are distributed over 2 systems client and
server the advantages: -simplicity and compatibility.

b) Three tier client/server architecture

This architecture adds an intermediates layer b/w the client and server called the application server/web server.
This layer stores constraints and procedure that are used to access data .it improves database security by checking a client’s
authorization.

The intermediate server accepts requests from the client, processes the request and sends database commands to the
DBserver, again data from the database server to the clients.

9 View of data in DBMS


Three schema architecture and data independence.
The goal of the 3-schema architecture is to achieve the important characteristics of the database approach that is
1. Insulation of program and data
2. Support of multiple views
3. Use of catalog to store the database description

Internal level: -It has an internal schema, which describes the physical storage structure of the database. It uses a physical
data model and describes the complete details of data storage.
Conceptual level: - It has conceptual schema which describes the structure of the whole database for a group of users, it
hides details of physical storage structures
External or view level: - It includes a number of external schemas or views. Each external schema describes the part of the
database(view) by creating different views for the different application .it is easy to identify specific data required to
support each application operation.
The process of transforming requests between different levels are called mapping.

10 Database users;
Actors on the scene: -
People or person who are involved in the design, use and maintenance of a large database are called actors on the scene.
1. Database administrators (DBA): -
• Database administrator is responsible for managing the database and the DBMS software.
• DBA is responsible for authorizing access (granting permissions) to the users of database.
• DBMS is responsible for coordinating and monitoring its use.
• Acquiring software and hardware resources.
• For defining procedures to recover the database from failures.

2. Database designers (DBD): -

• DBD are responsible for identifying the data to be stored in the database and for choosing appropriate
structure to store the data.
• It is the responsibility of the DBD to communicate with all DB users to understand their requirement.
• To create a database design that meet user requirements.
• Develop views of the database that meet the data and processing requirement of these groups.

3. End users: -

End users are the persons who involves in access to the database for querying, updating, and generating reports.
There are several categories of end users: -
I. Casual end users.
II. Naive or parametric end users
III. Sophisticated end users.
IV. Standalone users.

Casual end users: -Occasionally access the database, but they may need different information each time.
Ex: -high level managers.
Naive or parametric end users: -These users constantly perform querying and updating the database. They do not
know anything about database system.
Ex: -reservation agents.
Sophisticated end users: -These users are thoroughly familiarized themselves with the facilities of the DBMS.
Ex: -scientists, engineers etc.
Standalone end users: -These users maintain database for their personal use by using readymade program
Ex: -tally.
4. System analysts and application programmers.

System analysts determine the requirements of end users.


Application programmers implement the user’s specification as programs then they text, debug, document and maintain
these transaction

Workers behind the scenes: -


People who work to maintain the database system environment, but they are not actively interested in the database
contents.
There are several categories of workers behind the scenes.
1. DBMS system designers and implementers: -These are persons who design and implements the DBMS modules
and interfaces as a software package.
2. Tool developers: - These persons are responsible for design and implement tool to the software packages for
database system design, and improved performance. Tools are optional packages that are often purchased
separately.
3. Operators and maintenance personnel: -These persons are responsible for the actual running and maintenance of
the hardware and software environment for the database system.

11 Role and responsibilities of DBA


Database administrators (DBA): -

• Database administrator is responsible for managing the database and the DBMS software.
• DBA is responsible for authorizing access (granting permissions) to the users of database.
• DBMS is responsible for coordinating and monitoring its use.
• Acquiring software and hardware resources.
• For defining procedures to recover the database from failures.

12 Case study: Example of any database Application, recruitment database

You might also like