SlideShare a Scribd company logo
1 of 17
Introduction
īŽ Database integral part of our day to day life
īŽ Collection of related database
īŽ Database Management System : software
managing and controlling access to the
database.
īŽ Database system : collection of application
interracting with database
Example of use of database systems
A database is accessed when :
īą Purshasing in a supermarket ( item price)
īą Purchase using credit cards ( valid cards)
īą Inquiries about a holliday (flight details)
īą Make a loan (library)
īą Rent video ( detail info on each video)
īą Online bookstore( book details)
Sample data
Dtabase in the dev cycle
Project
Identifcation
and Selection
Project
Initiation
and Planning
Analysis
Logical
Design
Physical
Design
Implementation
Maintenance
Database
īą A repository of data simultaneously used by many
users (a shared ressource).
īą Collection of logically related data.
īą Description of this data (data dictionary)
īą BDMS
Software interracting with :
īą Users
īą Application programs
īą database
īą BDMS
Software interracting with :
īą Users
īą Application programs
īą Database
DBMS allows users (using a query language):
īą Insert
īą Update
īą Delete
īą Retrive data from DB
Database application programs
Computer program that allow
users to interact with the DB
through DBMS.
DBMS environment
īŽ
Hardware :Computer systems that DBMS and
application programs run on.
īŽ
Software: DBMS,application programs, operating
system, network software(if DBMS used over
network).
īŽ
Data ( operational data and meta-data)
īŽ
Procedures: instruction and rules that govern use of
database
īŽ
People: DB designer, administrators , programmers
and end users
Database environment
DBMS architecture
2 layer architecture Client-Server
īŽ The client that runs the application and the server that
handles the database back-end
īŽ Multiple users able to access the DB simultanousely.
īŽ Server is processing data while the client for business
logic and presentation.
2-Tier Architecture
DBMS architecture
3 layer architecture
īŽ User Interface layer ( runs on the user´s client)
īŽ Business logic (middle layer) and data processing
layer. Runs on a server called ”application server”.
īŽ DBMS ( store data ) , may run on a separate server
called ”database server”
3 layer architecture advantages
īŽ Thin client (less hardware) , client only handling
presentation logic.This means a little communication
needed between the client(browser) and the middle tier.
īŽ Separating the core business logic from the database
functions
īŽ Modularity : Easy to modify or replace one tier without
affecting the other tiers
īŽ Easier load balancing
īŽ Maps quite naturally to the web environment
īŽ Security : middle tier protecting the DB.
īŽ Scalabale : add as many middle tier as needed
Functions of a DBMS
īŽ Data storage , retrieval and update
īŽ A user-accessible Catalog
īŽ Hold data about the structure of database , users , applications and so on
īŽ Transaction support
īŽ Ensure that all the updates are made or that none of them are made
īŽ Concurrency control services
īŽ Enable many users to access shared data concurrently
īŽ Recovery services
īŽ When transaction fails, DB revovered to a consistent state
Functions of a DBMS
īŽ Autorization services
īŽ Only special part could have access to info
īŽ Support for data communication
īŽ Terminal at remote locations can communicate with host of DBMS through
network
īŽ Integrity Services
īŽ Stored data are consistent and correct
īŽ Services to promote Data Independence
īŽ Utility Services
īŽ Utility program help manage the DB effectively
Advantages of DBMS
īŽ Control of data redundancy (duplication)
īą Eliminate redundency where possible ,
īŽ Data consistency
īą Data stored in more than once , system can ensure that all copies
of the data are kept consistent
īŽ Sharing of data
īą By all authorized users
īŽ Improved data integrity
īą Rules that DB is not permitted to violate
īą User define data and DBMS enforce it
īŽ Improved maintenance through data independence
īŽ Make application immune to changes in data description

More Related Content

What's hot

Data Base Management
Data Base ManagementData Base Management
Data Base Management
Apex
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
guest8fdbdd
 
Database administrator
Database administratorDatabase administrator
Database administrator
Tech_MX
 
1. intro
1. intro1. intro
1. intro
khoahuy82
 

What's hot (16)

Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
 
Data Base Management
Data Base ManagementData Base Management
Data Base Management
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management System
 
Users of dbms
Users of dbmsUsers of dbms
Users of dbms
 
A database management system
A database management systemA database management system
A database management system
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management System
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
Database
DatabaseDatabase
Database
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbms
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Client server computing
Client server computingClient server computing
Client server computing
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
 
05_system architecture
05_system architecture05_system architecture
05_system architecture
 
1. intro
1. intro1. intro
1. intro
 

Viewers also liked

Naïve bayes
Naïve bayesNaïve bayes
Naïve bayes
David Hoen
 
Aquarel.les de la tardor
Aquarel.les de la tardorAquarel.les de la tardor
Aquarel.les de la tardor
17081965
 

Viewers also liked (14)

Curso tÊcnico especializado: Control Previo
Curso tÊcnico especializado: Control PrevioCurso tÊcnico especializado: Control Previo
Curso tÊcnico especializado: Control Previo
 
Naïve bayes
Naïve bayesNaïve bayes
Naïve bayes
 
BIS Conferrings 2016
BIS Conferrings 2016BIS Conferrings 2016
BIS Conferrings 2016
 
tablas y esquemas en powerpoint
tablas y esquemas en powerpointtablas y esquemas en powerpoint
tablas y esquemas en powerpoint
 
slideshare
slideshareslideshare
slideshare
 
Jurnal acsy ganjil 2015 2016
Jurnal acsy ganjil 2015 2016Jurnal acsy ganjil 2015 2016
Jurnal acsy ganjil 2015 2016
 
Temario de curso de cocina jaÊn acoge. EncarnaciÃŗn Montiel Martos.
Temario de curso de cocina jaÊn acoge. EncarnaciÃŗn Montiel Martos.Temario de curso de cocina jaÊn acoge. EncarnaciÃŗn Montiel Martos.
Temario de curso de cocina jaÊn acoge. EncarnaciÃŗn Montiel Martos.
 
Curso: Las Nuevas Contrataciones PÃēblicas 2017
Curso: Las Nuevas Contrataciones PÃēblicas 2017Curso: Las Nuevas Contrataciones PÃēblicas 2017
Curso: Las Nuevas Contrataciones PÃēblicas 2017
 
Water_PT
Water_PTWater_PT
Water_PT
 
Aquarel.les de la tardor
Aquarel.les de la tardorAquarel.les de la tardor
Aquarel.les de la tardor
 
PrÊsentation du FIFAMANOR
PrÊsentation du FIFAMANORPrÊsentation du FIFAMANOR
PrÊsentation du FIFAMANOR
 
Traitement Biologique des Eaux UsÊes au Maroc : DÊveloppement d’un biorÊacteu...
Traitement Biologique des Eaux UsÊes au Maroc : DÊveloppement d’un biorÊacteu...Traitement Biologique des Eaux UsÊes au Maroc : DÊveloppement d’un biorÊacteu...
Traitement Biologique des Eaux UsÊes au Maroc : DÊveloppement d’un biorÊacteu...
 
SRW-Report
SRW-ReportSRW-Report
SRW-Report
 
Radius in Anaheim, California 2015
Radius in Anaheim, California 2015Radius in Anaheim, California 2015
Radius in Anaheim, California 2015
 

Similar to Database introduction

Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
ahfiki
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
sethu pm
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptx
ATIFAZEEZ1
 
Dbms
DbmsDbms
Dbms
sevtap87
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdf
archanacomputers1
 

Similar to Database introduction (20)

DataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTDataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPT
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
Assign 1
Assign 1Assign 1
Assign 1
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
Lecture1
Lecture1Lecture1
Lecture1
 
En ch01
En ch01En ch01
En ch01
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
 
Chapter1
Chapter1Chapter1
Chapter1
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptx
 
DBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptxDBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptx
 
Dbms
DbmsDbms
Dbms
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdf
 
ppt on database management
ppt on database management ppt on database management
ppt on database management
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdf
 

More from David Hoen

Computer security
Computer securityComputer security
Computer security
David Hoen
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
David Hoen
 
Building a-database
Building a-databaseBuilding a-database
Building a-database
David Hoen
 
Decision tree
Decision treeDecision tree
Decision tree
David Hoen
 
Database constraints
Database constraintsDatabase constraints
Database constraints
David Hoen
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
David Hoen
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
David Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
David Hoen
 
Key exchange in crypto
Key exchange in cryptoKey exchange in crypto
Key exchange in crypto
David Hoen
 
Nlp naive bayes
Nlp naive bayesNlp naive bayes
Nlp naive bayes
David Hoen
 
Prolog resume
Prolog resumeProlog resume
Prolog resume
David Hoen
 
Access data connection
Access data connectionAccess data connection
Access data connection
David Hoen
 
Basic dns-mod
Basic dns-modBasic dns-mod
Basic dns-mod
David Hoen
 
Database concepts
Database conceptsDatabase concepts
Database concepts
David Hoen
 
Hashfunction
HashfunctionHashfunction
Hashfunction
David Hoen
 
Datamining with nb
Datamining with nbDatamining with nb
Datamining with nb
David Hoen
 
Text categorization as a graph
Text categorization as a graph Text categorization as a graph
Text categorization as a graph
David Hoen
 
Xml schema
Xml schemaXml schema
Xml schema
David Hoen
 
Text classification
Text classificationText classification
Text classification
David Hoen
 
Text classification methods
Text classification methodsText classification methods
Text classification methods
David Hoen
 

More from David Hoen (20)

Computer security
Computer securityComputer security
Computer security
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
 
Building a-database
Building a-databaseBuilding a-database
Building a-database
 
Decision tree
Decision treeDecision tree
Decision tree
 
Database constraints
Database constraintsDatabase constraints
Database constraints
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Key exchange in crypto
Key exchange in cryptoKey exchange in crypto
Key exchange in crypto
 
Nlp naive bayes
Nlp naive bayesNlp naive bayes
Nlp naive bayes
 
Prolog resume
Prolog resumeProlog resume
Prolog resume
 
Access data connection
Access data connectionAccess data connection
Access data connection
 
Basic dns-mod
Basic dns-modBasic dns-mod
Basic dns-mod
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Datamining with nb
Datamining with nbDatamining with nb
Datamining with nb
 
Text categorization as a graph
Text categorization as a graph Text categorization as a graph
Text categorization as a graph
 
Xml schema
Xml schemaXml schema
Xml schema
 
Text classification
Text classificationText classification
Text classification
 
Text classification methods
Text classification methodsText classification methods
Text classification methods
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎ī¸+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls đŸĨ° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸĨ° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸĨ° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸĨ° 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Database introduction

  • 1. Introduction īŽ Database integral part of our day to day life īŽ Collection of related database īŽ Database Management System : software managing and controlling access to the database. īŽ Database system : collection of application interracting with database
  • 2. Example of use of database systems A database is accessed when : īą Purshasing in a supermarket ( item price) īą Purchase using credit cards ( valid cards) īą Inquiries about a holliday (flight details) īą Make a loan (library) īą Rent video ( detail info on each video) īą Online bookstore( book details)
  • 4. Dtabase in the dev cycle Project Identifcation and Selection Project Initiation and Planning Analysis Logical Design Physical Design Implementation Maintenance
  • 5. Database īą A repository of data simultaneously used by many users (a shared ressource). īą Collection of logically related data. īą Description of this data (data dictionary) īą BDMS Software interracting with : īą Users īą Application programs īą database
  • 6. īą BDMS Software interracting with : īą Users īą Application programs īą Database DBMS allows users (using a query language): īą Insert īą Update īą Delete īą Retrive data from DB
  • 7. Database application programs Computer program that allow users to interact with the DB through DBMS.
  • 8. DBMS environment īŽ Hardware :Computer systems that DBMS and application programs run on. īŽ Software: DBMS,application programs, operating system, network software(if DBMS used over network). īŽ Data ( operational data and meta-data) īŽ Procedures: instruction and rules that govern use of database īŽ People: DB designer, administrators , programmers and end users
  • 10. DBMS architecture 2 layer architecture Client-Server īŽ The client that runs the application and the server that handles the database back-end īŽ Multiple users able to access the DB simultanousely. īŽ Server is processing data while the client for business logic and presentation.
  • 12. DBMS architecture 3 layer architecture īŽ User Interface layer ( runs on the user´s client) īŽ Business logic (middle layer) and data processing layer. Runs on a server called ”application server”. īŽ DBMS ( store data ) , may run on a separate server called ”database server”
  • 13.
  • 14. 3 layer architecture advantages īŽ Thin client (less hardware) , client only handling presentation logic.This means a little communication needed between the client(browser) and the middle tier. īŽ Separating the core business logic from the database functions īŽ Modularity : Easy to modify or replace one tier without affecting the other tiers īŽ Easier load balancing īŽ Maps quite naturally to the web environment īŽ Security : middle tier protecting the DB. īŽ Scalabale : add as many middle tier as needed
  • 15. Functions of a DBMS īŽ Data storage , retrieval and update īŽ A user-accessible Catalog īŽ Hold data about the structure of database , users , applications and so on īŽ Transaction support īŽ Ensure that all the updates are made or that none of them are made īŽ Concurrency control services īŽ Enable many users to access shared data concurrently īŽ Recovery services īŽ When transaction fails, DB revovered to a consistent state
  • 16. Functions of a DBMS īŽ Autorization services īŽ Only special part could have access to info īŽ Support for data communication īŽ Terminal at remote locations can communicate with host of DBMS through network īŽ Integrity Services īŽ Stored data are consistent and correct īŽ Services to promote Data Independence īŽ Utility Services īŽ Utility program help manage the DB effectively
  • 17. Advantages of DBMS īŽ Control of data redundancy (duplication) īą Eliminate redundency where possible , īŽ Data consistency īą Data stored in more than once , system can ensure that all copies of the data are kept consistent īŽ Sharing of data īą By all authorized users īŽ Improved data integrity īą Rules that DB is not permitted to violate īą User define data and DBMS enforce it īŽ Improved maintenance through data independence īŽ Make application immune to changes in data description