SlideShare a Scribd company logo
1 of 15
Database Management System
MIS 520 – Database Theory
Fall 2001 (Day)
Lecture 13
Database Management
System
Database: A collection of related data. It should support
– Definition
– Construction
– Manipulation
Database Management System: A collection of programs
that enable the users to create and maintain a database.
Features of DBMS
1. Data storage, retrieval, and update: The ability to store,
retrieve, and update the data that are in the database.
2. User-accessible catalog: where descriptions of database
components are stored and are accessible to the users
3. Shared update support: A mechanism to ensure accuracy when
several users are updating the database at the same time
4. Backup and Recovery Services: Mechanisms for recovering
the database in the event that a database is damaged somehow.
5. Security Services: Mechanisms to ensure that certain rules are
followed with regard to data in the database and any changes
that are made in the data
Features of DBMS
5. Integrity services: Mechanisms to ensure that certain rules are
followed with regard to data in the database and any changes
that are made in the data.
6. Data Independence: Facilities to support the independence of
programs from the structure of the database.
7. Replication support: A facility to manage copies of the same
data at multiple locations.
8. Utility Services: DBMS provided services that assist in the
general maintenance of the database.
Shared Updates
• Multiple users are making updates to the database at
the same time.
Problem:
– Multiple people updating the database simultaneously can override
each other
Example:
– Agents T1 & T2 simultaneously read the seats reserved on Flight 890
i.e. 80
– T1 cancels 5 seats updating the seats reserved on Flight 890 to 75
– T2 reserves 4 additional seats on the flight and updates the seats
reserved on Flight 890 to 84.
– If T1 updates the database before T2. T2 will override T1’s change
and make reservations to 84 rather than getting the correct value of
79.
– Similarly if T2 updates before T1 the seats reserved will be 75
Shared Updates: Solution
• Batch Processing
– Allow multiple users to retrieve data simultaneously
– Updates are added to a batch file which does the
appropriate processing
– Does not work for real time situations
• Locking
– Restrict access to the record being updated by a user till
the transaction is complete.
Two Phase Lock
• Required when multiple records are updated as a
result of a user action (e.g. filling form etc.)
• All the records accessed are locked progressively till
the required updates are completed
– Growing Phase: More and more locks are added without
releasing locks
– After all locks are placed the database is updated
– Shrinking Phase: All locks are removed and no new ones
are added
Deadlock
• When two transactions require a common set
of records.
• Both of them are in growing phase and each
locks some of the records
• None of the records are released and they wait
for each other to release the locked records
They will wait forever!!!
Breaking Deadlock
Facilities
• Programs can lock entire tables or an individual row
• Programs can release any or all of the locks they currently
hold
• Programs can inquire whether a given row or table is locked
Rules
• If more than one row is required then the entire table must be
locked
• Limit the amount of wait for a lock to be released beyond
which a transaction is aborted
• A well designed transaction should lock all the rows and tables
before starting the transaction
• Users should release locks as soon as possible to improve the
efficiency of the database
Security
• Protection against unauthorized access: either
intentional or accidental.
• Three main features for protection
– Passwords: Allows only authorized users to
access the database. Access privileges can be
provided based on access needs
– Encryption: Encodes data to non-decipherable.
Data decoded on demand to prevent hackers from
accessing data
– Views: Different snapshot of the data ensures that
users only get access to data they need
Integrity
• Integrity Constraints are the conditions that data
must satisfy during initial input & updates.
• There are four categories of constraints
– Data Type
– Legal Values
– Format
– Key Constraints
• Entity Integrity Constraints (Primary Key)
– Enforces the uniqueness of the primary key
• Referential Integrity Constraints (Foreign Key)
– Value of foreign key must match the value of primary key for
some row in another table
Integrity: Solutions
• Ignore constraint
– Undesirable as it can lead to inconsistent data
• Let user enforce the constraint
– Undesirable since user mistakes can be disastrous
• Let programmer build the logic of constraints in
the programs
– Makes programs complex: harder to write, harder to
maintain, and expensive
• Place burden on the DBMS.
– Preferred way: Cost of DBMS development
amortized over large user base, hence economical
Replication
• Duplication of data at multiple physical
locations
• Each replica of the data can be changed
independently
• Periodically the replicas update their data to
the master database – this process is called
synchronization
Disaster Planning: Backup & Recovery
• Database can be damaged in a number of ways
– Power outage, disk crashes, floods, user errors
• Periodic backups limit the loss due to sudden
failures
• Data can be recovered from the latest backup
and the changes since the backup need to be
done in either of two ways
– Manually
– From a catalog (if exists) recording all updates to
the database since the last backup.
Catalog/Data Dictionary
• Contains information describing the database
– Schema for the database
– Characteristic for each field
– Possible values for each field
– Description of the data
– Relationships
– Description of the programs
• Data Dictionary is same as catalog but may
contain wider set of information than catalog

More Related Content

What's hot

Backup and recovery in sql server database
Backup and recovery in sql server databaseBackup and recovery in sql server database
Backup and recovery in sql server databaseAnshu Maurya
 
The Key Responsibilities of a Database Administrator
The Key Responsibilities of a Database AdministratorThe Key Responsibilities of a Database Administrator
The Key Responsibilities of a Database Administratordsp
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesHTS Hosting
 
Geek Sync | Top Metrics to Monitor in Your MySQL Databases
Geek Sync | Top Metrics to Monitor in Your MySQL DatabasesGeek Sync | Top Metrics to Monitor in Your MySQL Databases
Geek Sync | Top Metrics to Monitor in Your MySQL DatabasesIDERA Software
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecturetahir khan
 
Survey on Client Tools, Server and Communication types
Survey on Client Tools, Server and Communication typesSurvey on Client Tools, Server and Communication types
Survey on Client Tools, Server and Communication typesManjuShanmugam1593
 
client and server
client and server client and server
client and server sanju249
 
Introduction to transaction management
Introduction to transaction managementIntroduction to transaction management
Introduction to transaction managementDr. C.V. Suresh Babu
 
Database administrator project-presentation-1-v1
Database administrator project-presentation-1-v1Database administrator project-presentation-1-v1
Database administrator project-presentation-1-v1galibhussain
 
Function
FunctionFunction
Functionrey501
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management SystemPapan Sarkar
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Rajesh Kumar
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Andrew Adam
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityMohd Arif
 

What's hot (19)

Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Backup and recovery in sql server database
Backup and recovery in sql server databaseBackup and recovery in sql server database
Backup and recovery in sql server database
 
The Key Responsibilities of a Database Administrator
The Key Responsibilities of a Database AdministratorThe Key Responsibilities of a Database Administrator
The Key Responsibilities of a Database Administrator
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based Services
 
Tech Vault Solution
Tech Vault SolutionTech Vault Solution
Tech Vault Solution
 
Geek Sync | Top Metrics to Monitor in Your MySQL Databases
Geek Sync | Top Metrics to Monitor in Your MySQL DatabasesGeek Sync | Top Metrics to Monitor in Your MySQL Databases
Geek Sync | Top Metrics to Monitor in Your MySQL Databases
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Ch18
Ch18Ch18
Ch18
 
Survey on Client Tools, Server and Communication types
Survey on Client Tools, Server and Communication typesSurvey on Client Tools, Server and Communication types
Survey on Client Tools, Server and Communication types
 
client and server
client and server client and server
client and server
 
Introduction to transaction management
Introduction to transaction managementIntroduction to transaction management
Introduction to transaction management
 
Database administrator project-presentation-1-v1
Database administrator project-presentation-1-v1Database administrator project-presentation-1-v1
Database administrator project-presentation-1-v1
 
Chapter09
Chapter09Chapter09
Chapter09
 
Function
FunctionFunction
Function
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management System
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01
 
Grid computing
Grid computingGrid computing
Grid computing
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 

Similar to What is Database Management System

dbms.ppt
dbms.pptdbms.ppt
dbms.pptRomyA2
 
Functions of database management systems
Functions of database management systemsFunctions of database management systems
Functions of database management systemsUZAIR UDDIN SHAIKH
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Surya Swaroop
 
dbms ppt.pptx database management system
dbms ppt.pptx database management systemdbms ppt.pptx database management system
dbms ppt.pptx database management systemdeeptipal230
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxMEGHANA508383
 
Advance database system (part 2)
Advance database system (part 2)Advance database system (part 2)
Advance database system (part 2)Abdullah Khosa
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notesUTSAHSINGH2
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)welcometofacebook
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteRaj vardhan
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxSakshiGawde6
 
2019 03 05_biological_databases_part3_v_upload
2019 03 05_biological_databases_part3_v_upload2019 03 05_biological_databases_part3_v_upload
2019 03 05_biological_databases_part3_v_uploadProf. Wim Van Criekinge
 
System Analysis And Design
System Analysis And DesignSystem Analysis And Design
System Analysis And DesignLijo Stalin
 
Introduction to Database Management System.pdf
Introduction to Database Management System.pdfIntroduction to Database Management System.pdf
Introduction to Database Management System.pdfbiswajit62002
 

Similar to What is Database Management System (20)

dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
7.ppt
7.ppt7.ppt
7.ppt
 
Functions of database management systems
Functions of database management systemsFunctions of database management systems
Functions of database management systems
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
dbms ppt.pptx database management system
dbms ppt.pptx database management systemdbms ppt.pptx database management system
dbms ppt.pptx database management system
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
 
Advance database system (part 2)
Advance database system (part 2)Advance database system (part 2)
Advance database system (part 2)
 
Intro.pptx
Intro.pptxIntro.pptx
Intro.pptx
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notes
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)
 
1_DBMS_Introduction.pdf
1_DBMS_Introduction.pdf1_DBMS_Introduction.pdf
1_DBMS_Introduction.pdf
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 
Unit1 dbms
Unit1 dbmsUnit1 dbms
Unit1 dbms
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 
2019 03 05_biological_databases_part3_v_upload
2019 03 05_biological_databases_part3_v_upload2019 03 05_biological_databases_part3_v_upload
2019 03 05_biological_databases_part3_v_upload
 
System Analysis And Design
System Analysis And DesignSystem Analysis And Design
System Analysis And Design
 
Intoduction- Database Management System
Intoduction- Database Management SystemIntoduction- Database Management System
Intoduction- Database Management System
 
Chapter02-rev.pptx
Chapter02-rev.pptxChapter02-rev.pptx
Chapter02-rev.pptx
 
Introduction to Database Management System.pdf
Introduction to Database Management System.pdfIntroduction to Database Management System.pdf
Introduction to Database Management System.pdf
 

Recently uploaded

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 

Recently uploaded (20)

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 

What is Database Management System

  • 1. Database Management System MIS 520 – Database Theory Fall 2001 (Day) Lecture 13
  • 2. Database Management System Database: A collection of related data. It should support – Definition – Construction – Manipulation Database Management System: A collection of programs that enable the users to create and maintain a database.
  • 3. Features of DBMS 1. Data storage, retrieval, and update: The ability to store, retrieve, and update the data that are in the database. 2. User-accessible catalog: where descriptions of database components are stored and are accessible to the users 3. Shared update support: A mechanism to ensure accuracy when several users are updating the database at the same time 4. Backup and Recovery Services: Mechanisms for recovering the database in the event that a database is damaged somehow. 5. Security Services: Mechanisms to ensure that certain rules are followed with regard to data in the database and any changes that are made in the data
  • 4. Features of DBMS 5. Integrity services: Mechanisms to ensure that certain rules are followed with regard to data in the database and any changes that are made in the data. 6. Data Independence: Facilities to support the independence of programs from the structure of the database. 7. Replication support: A facility to manage copies of the same data at multiple locations. 8. Utility Services: DBMS provided services that assist in the general maintenance of the database.
  • 5. Shared Updates • Multiple users are making updates to the database at the same time. Problem: – Multiple people updating the database simultaneously can override each other Example: – Agents T1 & T2 simultaneously read the seats reserved on Flight 890 i.e. 80 – T1 cancels 5 seats updating the seats reserved on Flight 890 to 75 – T2 reserves 4 additional seats on the flight and updates the seats reserved on Flight 890 to 84. – If T1 updates the database before T2. T2 will override T1’s change and make reservations to 84 rather than getting the correct value of 79. – Similarly if T2 updates before T1 the seats reserved will be 75
  • 6. Shared Updates: Solution • Batch Processing – Allow multiple users to retrieve data simultaneously – Updates are added to a batch file which does the appropriate processing – Does not work for real time situations • Locking – Restrict access to the record being updated by a user till the transaction is complete.
  • 7. Two Phase Lock • Required when multiple records are updated as a result of a user action (e.g. filling form etc.) • All the records accessed are locked progressively till the required updates are completed – Growing Phase: More and more locks are added without releasing locks – After all locks are placed the database is updated – Shrinking Phase: All locks are removed and no new ones are added
  • 8. Deadlock • When two transactions require a common set of records. • Both of them are in growing phase and each locks some of the records • None of the records are released and they wait for each other to release the locked records They will wait forever!!!
  • 9. Breaking Deadlock Facilities • Programs can lock entire tables or an individual row • Programs can release any or all of the locks they currently hold • Programs can inquire whether a given row or table is locked Rules • If more than one row is required then the entire table must be locked • Limit the amount of wait for a lock to be released beyond which a transaction is aborted • A well designed transaction should lock all the rows and tables before starting the transaction • Users should release locks as soon as possible to improve the efficiency of the database
  • 10. Security • Protection against unauthorized access: either intentional or accidental. • Three main features for protection – Passwords: Allows only authorized users to access the database. Access privileges can be provided based on access needs – Encryption: Encodes data to non-decipherable. Data decoded on demand to prevent hackers from accessing data – Views: Different snapshot of the data ensures that users only get access to data they need
  • 11. Integrity • Integrity Constraints are the conditions that data must satisfy during initial input & updates. • There are four categories of constraints – Data Type – Legal Values – Format – Key Constraints • Entity Integrity Constraints (Primary Key) – Enforces the uniqueness of the primary key • Referential Integrity Constraints (Foreign Key) – Value of foreign key must match the value of primary key for some row in another table
  • 12. Integrity: Solutions • Ignore constraint – Undesirable as it can lead to inconsistent data • Let user enforce the constraint – Undesirable since user mistakes can be disastrous • Let programmer build the logic of constraints in the programs – Makes programs complex: harder to write, harder to maintain, and expensive • Place burden on the DBMS. – Preferred way: Cost of DBMS development amortized over large user base, hence economical
  • 13. Replication • Duplication of data at multiple physical locations • Each replica of the data can be changed independently • Periodically the replicas update their data to the master database – this process is called synchronization
  • 14. Disaster Planning: Backup & Recovery • Database can be damaged in a number of ways – Power outage, disk crashes, floods, user errors • Periodic backups limit the loss due to sudden failures • Data can be recovered from the latest backup and the changes since the backup need to be done in either of two ways – Manually – From a catalog (if exists) recording all updates to the database since the last backup.
  • 15. Catalog/Data Dictionary • Contains information describing the database – Schema for the database – Characteristic for each field – Possible values for each field – Description of the data – Relationships – Description of the programs • Data Dictionary is same as catalog but may contain wider set of information than catalog