Presentation is loading. Please wait.

Presentation is loading. Please wait.

Database concept Programs Data files. Data-

Similar presentations


Presentation on theme: "Database concept Programs Data files. Data-"— Presentation transcript:

1 Database concept Programs Data files. Data-
Data is collection of facts,figures or numbers. Information. Processed data is known as information.

2 Need of Database: To store data in tabular form, tabular form allow user to access and search data very easily. To manage large amount of data. Security is provided. Database can be defined as collection of tables. Example: student database :it contains 5 files like personal details,attendance ,marks,fees,sports details. So database contains files and files contain actual record or data. Record: record is collection of related data.

3 Front end: User Interface Back end Storage of data.

4 Database Management System (DMBS)
Collection of interrelated data Set of programs to access the data DMBS contains information about a particular enterprise DBMS provides an environment that it both convenient and efficient to use

5 Drawbacks of using file systems to store data:
Data redundancy and inconsistency Multiple file formats, duplication of information in different files Difficulty in accessing data Need to write a new program to carry out each new task Data isolation — multiple files and formats Integrity problems Integrity constraints (e.g. account balance > 0) become part of program code Hard to add new constraints or change existing ones

6 Advantages of DBMS 1) sharing of data. 2) Reduction in redundancy.
example --- maintenance of student personal details, maintenance of academic and sports details. Data stored in database is application independent. 3) Avoiding inconsistency. Redundancy incurs data inconsistency. Inconsistency means updation in one not in other record.

7 4)Transaction Support-
Transaction support avoid one way transaction problem. 5) Maintaining Integrity: Integrity means correct information is stored in database. Integrity constraints– applying conditions on data. 6) Enforcing Security: DBA assign privileges. 7) Balancing conflicting requirement: DBA structure database to full fill requirement of enterprise as well as individual user.

8 Application of database management system
1) banking 2)Airlines 3)universities 4)credit card transaction 5) telecommunication 6) sales and marketing 7) HR department 8) scientific application and government departments.

9 RDBMS(Relational database management system)
It is latest version of DBMS IN DBMS one table is related to another but in RDBMS one database is related to another database. It manipulate large amount of data than DBMS. High secured as compared to DBMS. Support multi user .

10 Names of various DBMS and RDBMS software.
DBMS: FoxPro,FoxproW,Dbase,MSAcess RDBMS:Oracle,DB2,SQL Server,MY Sql,sybase Informix.

11 Data Abstraction Data abstraction can be defined as process of hiding the complexity of data and representing the data which needs to be shown to users.

12 View of Data An architecture for a database system View level View 1
View n Logical level Physical level

13 Levels of Abstraction Physical level:
It is lowest level of abstraction. describes how a record (e.g. customer) is stored. This level is hidden from normal user.

14 Logical level: describes data stored in database, and the relationships among the data. type customer = record name: string; street: string; city: integer; end; Database administrator use logical level of abstraction to decide what data is to be store in database.

15 View level: View is used to represent the part of database to user. Views can also hide information (e.g. salary) for security purposes. Different views are created for same database can be created for users to interact with the database.

16 Database Languages. 1) data definition Languages.(DDL)
2) data manipulation Language.(DML) 3) data control language.(DCL)

17 Data definition Language.
It is used to define the basic structure of database. With this user can define the integrity constraints. Commands of DDL : 1)Create. 2)Alter 3)Drop 4)Truncate. 5)DESC 6)Rename. 7)Creating user. 8) Use of integrity constraints.

18 Data manipulation Languages.
Data manipulation language is used to manipulate data i.e. do operation on data. 1) Insert: 2)Update: 3)Delete. 4) call.

19 Data Control Language(DCL)
DCL are used to facilitate users to use privilege commands. Creators or owners of database objects have a complete authority over them. Database objects may be table, views etc. DCL commands 1) Grant 2) Revoke. 3) commit 4) Savepoint 5) Rollback.

20 Instance and schema schema: Overall design of database is known as schema(variable declaration) Schema defined at different levels are as follows: 1).Physical schema 2) Logical schema 3)subschema

21 Instance Instance: Collection of information stored in database at particular moment is called as an instance.(value of variable declared in program)

22 Data independence Types of data independence:
“The ability to modify a schema definition in one level without affecting a schema definition in a higher level is called data independence ” Types of data independence: 1)Physical data independence. 2) Logical data independence.

23 Physical Independence
Ability to modify physical schema without causing application programs to be rewritten. Modification at this level are done for improving performance.

24 Logical Independence Ability to modify logical schema without causing application programs to be rewritten it is usually done when logical structure of database is altered. Logical independence is harder to achieve because application program are depend upon logical structure of data.

25 Components of DBMS

26 Storage Manager Query Processor

27 Storage Manager Responsibilities: Storing Retrieving Updating
Storage Manager act as interface between database and queries submitted to the system. Storage Manager compiles or translates the commands of DML in to low level file system commands.

28 Components of Storage Manager
Authorization and integrity manager Transaction Manager File manager File Manager manage the allocation of space on disk. It allocates required space to files which are stored on storage disk. Buffer manager-Disk to main Memory.

29 Query Processor Components
1)DDL Interpreter 2)DML Compiler 3)Query Evaluation Engine 4)DML Compiler And Organizer 5)Compiler and Linker 6)Application Program Object Code

30 client server architecture.
Two tier architectures: In this architecture, client directly interact with the server. Internet Explorer and Web Server works on two tier architecture.

31 Client Server architecture.

32 3-tier architectures: In this architecture, one more software sits in between client and server. This middle software is called middleware. Middleware are used to perform all the security checks and load balancing in case of heavy load. A middleware takes all requests from the client and after doing required authentication it passes that request to the server. Then server does required processing and sends response back to the middleware and finally middleware passes this response back to the client. If you want to implement a 3-tier architecture then you can keep any middle ware like Web Logic or Web Sphere software in between your Web Server and Web Browsers.

33 3-tier architectures:

34 Advantages of 3 Tier Architecture
Scalability – middle tier can be used to reduce the load on a database sever by using a transaction processing (TP) monitor to reduce the number of connections to a server, and additional application servers can be added to distribute application processing Technological flexibility – easier to change DBMS engines middle tier can be moved to a different platform. Simplified presentation interfaces make it easier to implement new interfaces Long-term cost reduction – use of off-the-shelf Components or services in the middle tier can reduce costs, as can substitution of modules within an application rather than a whole application

35 Better match of systems to business needs – new modules can be built to support specific business needs rather than building more general, complete applications Improved customer service – multiple interfaces on different clients can access the same business process Competitive advantage – ability to react to business changes quickly by changing small modules of code rather than entire applications

36 Codds Rules: Information Rule:
All information in a relational database including table names, column names is represented in the form of tables. This simple view of data speeds up design and learning process. 2. Guaranteed Access Rule : Whole data should be available or accessible to the user without any ambiguity. Ambiguity can be avoided only through perfect combination of table name,primary key, and column. 3.Systematic treatment of null values. Absence of values should be treated properly.

37 4.Dynamic on-Line catalog based on the relational model(Database Description Rule ).
The description of a database is stored and maintained in the form of tables . This implies that a data dictionary should be present within the RDBMS. 5.Comprehensive Data Sub-language Rule Database needs to support minimum one clearly defined language This language should be capable of handling DML,DDL,DCL,data integrity, Eg.SQL 6.View Updating Rule changes made in the view are transmitted to the base table and vice-versa.

38 7.High Level Insert, Update and Delete
The RDBMS supports insertion, updating and deletion at a table level. 8. Physical Data Independence 9. Logical Data Independence 10.Integrity Independence 11. Non subversion Rule: There should not exist a way to modify or change the database structure except database languages. 12. Distribution Independence RDBMS package must makes it possible for the database to be distributed across multiple computers even though they are having heterogeneous platforms both for hardware and operating system. Database systems built on the relational framework are well suited for today's Client/Server database design.

39 Database Users Navie User Application Programmer Sophisticated User
Specialized User

40 Data warehousing. It is a place where huge amount of data is stored.
It can be referred as RDBMS. Data Mining. It is also known as knowledge Discovery in Databases. In data mining different tools are used to analyze, filter and transfer data from data warehouse.

41 Any Questions?


Download ppt "Database concept Programs Data files. Data-"

Similar presentations


Ads by Google