SlideShare a Scribd company logo
1 of 27
IntroductIon and hIstory of dBMs

SETHU.P.M

SJCET SCHOOL OF MANAGEMENT ,PALAI
File Based Data Management
Disadvantages of File based system
Why Use a DBMS?



Data independence and efficient access.



Reduced application development time.



Data integrity and security.



Uniform data administration.



Concurrent access, recovery from crashes.
A Database management systems (DBMS) is collection of
programs that enables users to create and maintain a database.
The DBMS is general purpose software system that facilitates
the processes of defining, constructing, manipulating and
sharing database among various users and application.
 Defining

a database involves specifiying the data types,
structures and constraints of the data to be stored in tthe
database.

 Constructing

the database is the process of storing the data on
some storage medium that is controlled by the DBMS.

 Manipulating

a database includes functions such as querying
the database to retrieve specific data, updating the database to
reflect changes in the miniworld and generating reports from
the data.



Sharing a database allows multiple users and programs to
access the database simultaneously.
Other important functions provided by the DBMS
include protecting the database and maintaining it
over a long period of time. Protection includes system
and security protection.
A typical large database may have life cycle of many
years, so the DBMS must be able to maintain the
database system by allowing the system to evolve as
requirements change over time.
Benefits of DBMS
 Reduction

in Data Redundancy.

 Reduction

in Inconsistency.

 Sharing

of Data.

 Enforcement

of Standards.

 Improvement

of Data Security.

 Maintenance

of Data Integrity.

 Better

Interaction with Users.

 Efficient

System.
Purpose of Database Systems
Database management systems were developed to handle
the following difficulties of typical file-processing
systems supported by conventional operating systems:
Data redundancy and inconsistency
 Difficulty in accessing data
 Data isolation – multiple files and formats
 Integrity problems
 Atomicity of updates
 Concurrent access by multiple users
 Security problems


8
Database Systems: A Brief Timeline
1980-present Era of
relational database and
Database Management
System (DBMS):
1968-1980 Era of nonrelational database: IBM’s first
hierarchical DBMS called IMS. CODASYL
DBTG model was for N/w. IDMS most
popular network DBMS.

1968 FileBased: Data
maintained in a flat
file.

Ancient Times:
RAM was expensive
and limited,
programmer
productivity low. 

Processing characteristics determined
by common use of magnetic tape
medium

Programmer Defined both logical & physical
structure, such as storage structure, access
methods, I/O modes etc.
Database Systems






1970: Ted Codd at IBM’s San Jose Lab proposed relational
models.
Two major projects start and both were operational in late 1970s
o INGRES at University of California, Berkeley became
commercial and followed up POSTGRES which was
incorporated into Informix.
o System R at IBM san Jose Lab, later evolved into DB2,
which became one of the first DBMS product based on the
relational model. (Oracle produced a similar product just
prior to DB2.)
1976: Peter Chen defined the Entity-relationship(ER) model
1980s: Maturation of the relational database technology, more
relational based DBMS were developed and SQL standard
adopted by ISO and ANSI.









1985: Object-oriented DBMS (OODBMS) develops. Little
success commercially because advantages did not justify the
cost of converting billions of bytes of data to new format
1990s: Incorporation of object-orientation in relational
DBMSs, new application areas, such as data warehousing and
OLAP, web and Internet, Interest in text and multimedia,
enterprise resource planning (ERP) and management resource
planning (MRP)
1991: Microsoft ships access, a personal DBMS created as
element of Windows gradually supplanted all other personal
DBMS products.
1995: First Internet database applications
1997: XML applied to database processing, which solves longstanding database problems. Major vendors begin to integrate
XML into DBMS products.
Components of a Database System
Four components: People, H/W, S/W, Data


Data: Data stored in a database include numerical data including whole numbers and
floating- point numbers, and non numerical data such as characters , date, logical
values.



Hardware: hardware of the system can range from to a network of computers .It also
includes various storage devices and input and output devices.
Software : Software of a DBMS includes the DBMS,
operating system , network software and the application
programs.
Users : Three broad classes of users are considered.
1.

Application
programs.

programmer:

Develop

application

2.

End-Users : Access the database from a terminal using
a query language.

3.

Data Base Administrator (DBA): The
construction and maintenance of a database.

design,
Files vs. DBMS
 Application

must stage large datasets
between main memory and secondary
storage (e.g., buffering, page-oriented
access, 32-bit addressing, etc.)
 Special code for different queries
 Must protect data from inconsistency
due to multiple concurrent users
 Crash recovery
 Security and access control

Slide No:L1-5
Purpose of Database Systems


In the early days, database applications were built directly on top
of file systems



Drawbacks of using file systems to store data
 Data


redundancy and inconsistency

Multiple file formats, duplication of information in different files

 Difficulty


in accessing data

Need to write a new program to carry out each new task

 Data

isolation — multiple files and formats

 Integrity

problems



Integrity constraints (e.g. account balance > 0) become “buried” in program code rather than being
stated explicitly



Hard to add new constraints or change existing ones
Concurrent access by multiple users
Concurrent

accessed needed for performance.

Uncontrolled

concurrent accesses can lead to inconsistencies.

 Example:

Two people reading a balance and updating it at
the same time.

Atomicity of updates
Failures

may leave database in an inconsistent state with partial
updates carried out.
Example:

Transfer of funds from one account to another should
either complete or not happen at all.
Security problems
Hard

to provide user access to some, but not all, data.
Types of Databases
 Single-user:
 Desktop:

Supports only one user at a time.
Single-user database running on a personal

computer.
 Multi-user: Supports multiple users at the same time.
 Workgroup: Multi-user database that supports a small
group of users or a single department.
 Enterprise: Multi-user database that supports a large group
of users or an entire organization.
 Can be classified by location:
◦ Centralized: Supports data located at a single site.
◦ Distributed: Supports data distributed across several
sites.
DATA LANGUAGES
The database provides a Data Definition
Language to specify the database schema and a Data
Manipulation Language to express database queries
and updates.
•

DATA-DEFINITION LANGUAGE (DDL)

•

DATA-MANIPULATION LANGUAGE (DML)




STORAGE DEFINITION LANGUAGE (SDL)
VIEW DEFINITION LANGUAGE (VDL)
Data-Definition Language (DDL)
We specify a database schema by a set of definition expressed by
a special language called a Data-Definition Language.
DDL is used to create and delete database and its objects.
These commands are primarily used by the DBA during the
building and removal phases of a database project.
Ex: ALTER, DROP, TRUNCATE, COMMENT, RENAME
Data Manipulation Language (DML)


Language for accessing and manipulating the data
organized by the appropriate data model.


DML also known as query language

The retrieval of information stored in the database.
• The insertion of new information into the database.
• The deletion of information from the database.
• The modification of information stored in the database.
 Two classes of languages
•

Procedural – user specifies what data is required and how to get
those data
 Nonprocedural – user specifies what data is required without
specifying how to get those data

Database Administrator


Coordinates all the activities of the database system; the database
administrator has a good understanding of the enterprise’s
information resources and needs:



Database administrator’s duties include:


Schema definition



Storage structure and access method definition



Schema and physical organization modification



Granting user authority to access the database



Specifying integrity constraints



Acting as liaison with users



Monitoring performance and responding to changes in
requirements
Database Users
 Users

are differentiated by the way they expect to
interact with the system.
 Application programmers: interact with system
through DML calls.
 Specialized users: write specialized database
applications that do not fit into the traditional data
processing framework
 Sophisticated users: form requests in a database
query language.
 Naive users: invoke one of the permanent application
programs that have been written previously
Advantages of DBMS
•

Data independence
•Application programs should

not, ideally, be exposed to
details of data representation and storage.
•

Efficient Data access
•A DBMS uses several powerful functions to

store and

retrieve data efficiently
•Data

Integrity and Security

•The

DBMS enforces integrity constraints to get a kind
of protection against prohibited access to data.
Advantages of DBMS
•

Data Administration

When any users share the data, centralizing the administration of
data can offer significant improvements.
•

Concurrent Access and Crash Recovery

A DBMS schedules concurrent access to the data in such manner that
users can think of the data as being accessed by only one user at a
time. DBMS also protects users from the effects of system failures.
•

Reduced Application Development Time

DBMS includes several important functions that are common to
many applications accessing data in the DBMS. In conjunction with
the high-level interface to the data, facilitates quick application
development.
Disadvantages of DBMS
a.
b.
c.
d.
e.
f.
g.
h.
i.

Complexity.
Size.
Technical experts are required .
Cost of DBMS development .
Additional hardware costs.
Performance monitoring & maintenance .
Higher impact of a failure.
Centralization: That is use of the same program at a time by many user sometimes
lead to loss of some data.
Limited Statistical Capabilities: Can not perform sophisticated calculations
Security issues.
Summary










Data are raw facts. Information is the result of processing data to reveal its
meaning.
To implement and manage a database, use a DBMS.
Database design defines the database structure.
A well-designed database facilitates data management and generates
accurate and valuable information.
A poorly designed database can lead to bad decision making, and bad
decision making can lead to the failure of an organization.
Databases were preceded by file systems.
Limitations of file system data management:
 requires extensive programming.
 system administration complex and difficult.
 making changes to existing structures is difficult.
 security features are likely to be inadequate.
 independent files tend to contain redundant data.
DBMS’s were developed to address file systems’ inherent weaknesses.
sethupmoo7@gmail.com
sethupm@ymail.com

More Related Content

What's hot

15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMS
koolkampus
 
1. Introduction to DBMS
1. Introduction to DBMS1. Introduction to DBMS
1. Introduction to DBMS
koolkampus
 
Overview of physical storage media
Overview of physical storage mediaOverview of physical storage media
Overview of physical storage media
Srinath Sri
 

What's hot (20)

Object Relational Database Management System(ORDBMS)
Object Relational Database Management System(ORDBMS)Object Relational Database Management System(ORDBMS)
Object Relational Database Management System(ORDBMS)
 
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMS
 
SQL(DDL & DML)
SQL(DDL & DML)SQL(DDL & DML)
SQL(DDL & DML)
 
Basic Concept of Database
Basic Concept of DatabaseBasic Concept of Database
Basic Concept of Database
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
Database fragmentation
Database fragmentationDatabase fragmentation
Database fragmentation
 
1. Introduction to DBMS
1. Introduction to DBMS1. Introduction to DBMS
1. Introduction to DBMS
 
Database language
Database languageDatabase language
Database language
 
DBMS Keys
DBMS KeysDBMS Keys
DBMS Keys
 
Relational algebra ppt
Relational algebra pptRelational algebra ppt
Relational algebra ppt
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
database language ppt.pptx
database language ppt.pptxdatabase language ppt.pptx
database language ppt.pptx
 
Dbms 4NF & 5NF
Dbms 4NF & 5NFDbms 4NF & 5NF
Dbms 4NF & 5NF
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
Mainframe systems
Mainframe systemsMainframe systems
Mainframe systems
 
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Normalization in DBMS
 
Relational model
Relational modelRelational model
Relational model
 
Dbms 3: 3 Schema Architecture
Dbms 3: 3 Schema ArchitectureDbms 3: 3 Schema Architecture
Dbms 3: 3 Schema Architecture
 
Object oriented databases
Object oriented databasesObject oriented databases
Object oriented databases
 
Overview of physical storage media
Overview of physical storage mediaOverview of physical storage media
Overview of physical storage media
 

Similar to Introduction & history of dbms

Similar to Introduction & history of dbms (20)

DBMS and its Models
DBMS and its ModelsDBMS and its Models
DBMS and its Models
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
Unit1 dbms
Unit1 dbmsUnit1 dbms
Unit1 dbms
 
Dbms models
Dbms modelsDbms models
Dbms models
 
En ch01
En ch01En ch01
En ch01
 
Chapter one
Chapter oneChapter one
Chapter one
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
Database Systems Lec 1.pptx
Database Systems Lec 1.pptxDatabase Systems Lec 1.pptx
Database Systems Lec 1.pptx
 
Introduction to DBMS.pptx
Introduction to DBMS.pptxIntroduction to DBMS.pptx
Introduction to DBMS.pptx
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 
DBMS_UNIT_1.pdf
DBMS_UNIT_1.pdfDBMS_UNIT_1.pdf
DBMS_UNIT_1.pdf
 
1.introduction qb
1.introduction qb1.introduction qb
1.introduction qb
 
Dbms Useful PPT
Dbms Useful PPTDbms Useful PPT
Dbms Useful PPT
 
Database management system
Database management systemDatabase management system
Database management system
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
DBMS introduction and functionality of of dbms
DBMS introduction and functionality of  of dbmsDBMS introduction and functionality of  of dbms
DBMS introduction and functionality of of dbms
 
Database Lecture Notes
Database Lecture NotesDatabase Lecture Notes
Database Lecture Notes
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdf
 
Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
 

More from sethu pm (8)

BUSINESS QUIZ 2014
BUSINESS QUIZ 2014 BUSINESS QUIZ 2014
BUSINESS QUIZ 2014
 
Business quiz 2014
Business quiz 2014Business quiz 2014
Business quiz 2014
 
Pta meeting function 2014 jan10 sjcet
Pta meeting function 2014 jan10 sjcetPta meeting function 2014 jan10 sjcet
Pta meeting function 2014 jan10 sjcet
 
Sap
SapSap
Sap
 
Sargasadhana 2013
Sargasadhana 2013Sargasadhana 2013
Sargasadhana 2013
 
sargasadhana sjcet pala
sargasadhana sjcet palasargasadhana sjcet pala
sargasadhana sjcet pala
 
FACULITY DEVELOPMENT PROGRAMME
FACULITY DEVELOPMENT PROGRAMME FACULITY DEVELOPMENT PROGRAMME
FACULITY DEVELOPMENT PROGRAMME
 
GEM AND JEWELLERY INDUSTRY IN INDIA
GEM AND JEWELLERY INDUSTRY IN INDIAGEM AND JEWELLERY INDUSTRY IN INDIA
GEM AND JEWELLERY INDUSTRY IN INDIA
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Introduction & history of dbms

  • 1. IntroductIon and hIstory of dBMs SETHU.P.M SJCET SCHOOL OF MANAGEMENT ,PALAI
  • 2. File Based Data Management
  • 3. Disadvantages of File based system
  • 4. Why Use a DBMS?  Data independence and efficient access.  Reduced application development time.  Data integrity and security.  Uniform data administration.  Concurrent access, recovery from crashes.
  • 5. A Database management systems (DBMS) is collection of programs that enables users to create and maintain a database. The DBMS is general purpose software system that facilitates the processes of defining, constructing, manipulating and sharing database among various users and application.  Defining a database involves specifiying the data types, structures and constraints of the data to be stored in tthe database.  Constructing the database is the process of storing the data on some storage medium that is controlled by the DBMS.  Manipulating a database includes functions such as querying the database to retrieve specific data, updating the database to reflect changes in the miniworld and generating reports from the data.  Sharing a database allows multiple users and programs to access the database simultaneously.
  • 6. Other important functions provided by the DBMS include protecting the database and maintaining it over a long period of time. Protection includes system and security protection. A typical large database may have life cycle of many years, so the DBMS must be able to maintain the database system by allowing the system to evolve as requirements change over time.
  • 7. Benefits of DBMS  Reduction in Data Redundancy.  Reduction in Inconsistency.  Sharing of Data.  Enforcement of Standards.  Improvement of Data Security.  Maintenance of Data Integrity.  Better Interaction with Users.  Efficient System.
  • 8. Purpose of Database Systems Database management systems were developed to handle the following difficulties of typical file-processing systems supported by conventional operating systems: Data redundancy and inconsistency  Difficulty in accessing data  Data isolation – multiple files and formats  Integrity problems  Atomicity of updates  Concurrent access by multiple users  Security problems  8
  • 9. Database Systems: A Brief Timeline 1980-present Era of relational database and Database Management System (DBMS): 1968-1980 Era of nonrelational database: IBM’s first hierarchical DBMS called IMS. CODASYL DBTG model was for N/w. IDMS most popular network DBMS. 1968 FileBased: Data maintained in a flat file. Ancient Times: RAM was expensive and limited, programmer productivity low.  Processing characteristics determined by common use of magnetic tape medium Programmer Defined both logical & physical structure, such as storage structure, access methods, I/O modes etc.
  • 10. Database Systems     1970: Ted Codd at IBM’s San Jose Lab proposed relational models. Two major projects start and both were operational in late 1970s o INGRES at University of California, Berkeley became commercial and followed up POSTGRES which was incorporated into Informix. o System R at IBM san Jose Lab, later evolved into DB2, which became one of the first DBMS product based on the relational model. (Oracle produced a similar product just prior to DB2.) 1976: Peter Chen defined the Entity-relationship(ER) model 1980s: Maturation of the relational database technology, more relational based DBMS were developed and SQL standard adopted by ISO and ANSI.
  • 11.      1985: Object-oriented DBMS (OODBMS) develops. Little success commercially because advantages did not justify the cost of converting billions of bytes of data to new format 1990s: Incorporation of object-orientation in relational DBMSs, new application areas, such as data warehousing and OLAP, web and Internet, Interest in text and multimedia, enterprise resource planning (ERP) and management resource planning (MRP) 1991: Microsoft ships access, a personal DBMS created as element of Windows gradually supplanted all other personal DBMS products. 1995: First Internet database applications 1997: XML applied to database processing, which solves longstanding database problems. Major vendors begin to integrate XML into DBMS products.
  • 12. Components of a Database System Four components: People, H/W, S/W, Data  Data: Data stored in a database include numerical data including whole numbers and floating- point numbers, and non numerical data such as characters , date, logical values.  Hardware: hardware of the system can range from to a network of computers .It also includes various storage devices and input and output devices.
  • 13. Software : Software of a DBMS includes the DBMS, operating system , network software and the application programs. Users : Three broad classes of users are considered. 1. Application programs. programmer: Develop application 2. End-Users : Access the database from a terminal using a query language. 3. Data Base Administrator (DBA): The construction and maintenance of a database. design,
  • 14. Files vs. DBMS  Application must stage large datasets between main memory and secondary storage (e.g., buffering, page-oriented access, 32-bit addressing, etc.)  Special code for different queries  Must protect data from inconsistency due to multiple concurrent users  Crash recovery  Security and access control Slide No:L1-5
  • 15. Purpose of Database Systems  In the early days, database applications were built directly on top of file systems  Drawbacks of using file systems to store data  Data  redundancy and inconsistency Multiple file formats, duplication of information in different files  Difficulty  in accessing data Need to write a new program to carry out each new task  Data isolation — multiple files and formats  Integrity problems  Integrity constraints (e.g. account balance > 0) become “buried” in program code rather than being stated explicitly  Hard to add new constraints or change existing ones
  • 16. Concurrent access by multiple users Concurrent accessed needed for performance. Uncontrolled concurrent accesses can lead to inconsistencies.  Example: Two people reading a balance and updating it at the same time. Atomicity of updates Failures may leave database in an inconsistent state with partial updates carried out. Example: Transfer of funds from one account to another should either complete or not happen at all. Security problems Hard to provide user access to some, but not all, data.
  • 17. Types of Databases  Single-user:  Desktop: Supports only one user at a time. Single-user database running on a personal computer.  Multi-user: Supports multiple users at the same time.  Workgroup: Multi-user database that supports a small group of users or a single department.  Enterprise: Multi-user database that supports a large group of users or an entire organization.  Can be classified by location: ◦ Centralized: Supports data located at a single site. ◦ Distributed: Supports data distributed across several sites.
  • 18. DATA LANGUAGES The database provides a Data Definition Language to specify the database schema and a Data Manipulation Language to express database queries and updates. • DATA-DEFINITION LANGUAGE (DDL) • DATA-MANIPULATION LANGUAGE (DML)   STORAGE DEFINITION LANGUAGE (SDL) VIEW DEFINITION LANGUAGE (VDL)
  • 19. Data-Definition Language (DDL) We specify a database schema by a set of definition expressed by a special language called a Data-Definition Language. DDL is used to create and delete database and its objects. These commands are primarily used by the DBA during the building and removal phases of a database project. Ex: ALTER, DROP, TRUNCATE, COMMENT, RENAME
  • 20. Data Manipulation Language (DML)  Language for accessing and manipulating the data organized by the appropriate data model.  DML also known as query language The retrieval of information stored in the database. • The insertion of new information into the database. • The deletion of information from the database. • The modification of information stored in the database.  Two classes of languages • Procedural – user specifies what data is required and how to get those data  Nonprocedural – user specifies what data is required without specifying how to get those data 
  • 21. Database Administrator  Coordinates all the activities of the database system; the database administrator has a good understanding of the enterprise’s information resources and needs:  Database administrator’s duties include:  Schema definition  Storage structure and access method definition  Schema and physical organization modification  Granting user authority to access the database  Specifying integrity constraints  Acting as liaison with users  Monitoring performance and responding to changes in requirements
  • 22. Database Users  Users are differentiated by the way they expect to interact with the system.  Application programmers: interact with system through DML calls.  Specialized users: write specialized database applications that do not fit into the traditional data processing framework  Sophisticated users: form requests in a database query language.  Naive users: invoke one of the permanent application programs that have been written previously
  • 23. Advantages of DBMS • Data independence •Application programs should not, ideally, be exposed to details of data representation and storage. • Efficient Data access •A DBMS uses several powerful functions to store and retrieve data efficiently •Data Integrity and Security •The DBMS enforces integrity constraints to get a kind of protection against prohibited access to data.
  • 24. Advantages of DBMS • Data Administration When any users share the data, centralizing the administration of data can offer significant improvements. • Concurrent Access and Crash Recovery A DBMS schedules concurrent access to the data in such manner that users can think of the data as being accessed by only one user at a time. DBMS also protects users from the effects of system failures. • Reduced Application Development Time DBMS includes several important functions that are common to many applications accessing data in the DBMS. In conjunction with the high-level interface to the data, facilitates quick application development.
  • 25. Disadvantages of DBMS a. b. c. d. e. f. g. h. i. Complexity. Size. Technical experts are required . Cost of DBMS development . Additional hardware costs. Performance monitoring & maintenance . Higher impact of a failure. Centralization: That is use of the same program at a time by many user sometimes lead to loss of some data. Limited Statistical Capabilities: Can not perform sophisticated calculations Security issues.
  • 26. Summary         Data are raw facts. Information is the result of processing data to reveal its meaning. To implement and manage a database, use a DBMS. Database design defines the database structure. A well-designed database facilitates data management and generates accurate and valuable information. A poorly designed database can lead to bad decision making, and bad decision making can lead to the failure of an organization. Databases were preceded by file systems. Limitations of file system data management:  requires extensive programming.  system administration complex and difficult.  making changes to existing structures is difficult.  security features are likely to be inadequate.  independent files tend to contain redundant data. DBMS’s were developed to address file systems’ inherent weaknesses.