This document provides an overview of key database concepts including data, information, databases, DBMS, RDBMS, SQL, data models, database design, normalization, and the entity-relationship model. It defines important terms, describes database applications, discusses the benefits of DBMS over file systems, and outlines database internals including storage management, users/administrators, and client-server architecture. Examples are provided to illustrate normalization and entity-relationship diagrams.
Database concepts and Archeticture Ch2 with in class ActivitiesZainab Almugbel
This is the slides of chapter 2 of the book Ramez Elmasri and Shamkant Navathe, "Fundamentals of Database Systems" 6th Edition, 2010
I did not include the activities in the slides. I printed them out in separate papers. Then, I asked students: who liked to participate in activity 1 (the interview) in the class. I selected 2 students for the first activity (one was the interviewer and another was the guest). I did the same for the other activities.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Usman Tariq
In this PPT, you will learn:
• About data modeling and why data models are important
• About the basic data-modeling building blocks
• What business rules are and how they influence database design
• How the major data models evolved
• About emerging alternative data models and the needs they fulfill
• How data models can be classified by their level of abstraction
Author: Carlos Coronel | Steven Morris
Database concepts and Archeticture Ch2 with in class ActivitiesZainab Almugbel
This is the slides of chapter 2 of the book Ramez Elmasri and Shamkant Navathe, "Fundamentals of Database Systems" 6th Edition, 2010
I did not include the activities in the slides. I printed them out in separate papers. Then, I asked students: who liked to participate in activity 1 (the interview) in the class. I selected 2 students for the first activity (one was the interviewer and another was the guest). I did the same for the other activities.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Usman Tariq
In this PPT, you will learn:
• About data modeling and why data models are important
• About the basic data-modeling building blocks
• What business rules are and how they influence database design
• How the major data models evolved
• About emerging alternative data models and the needs they fulfill
• How data models can be classified by their level of abstraction
Author: Carlos Coronel | Steven Morris
● Why Databases?
● Why Database Design is Important?
● The Database System Environment and Functions.
● Managing the Database System: A Shift in Focus.
Database management system is a computer software system that has been designed to manage databases, Oracle, DB2, Microsoft Access among others are examples of DBMS.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
● Why Databases?
● Why Database Design is Important?
● The Database System Environment and Functions.
● Managing the Database System: A Shift in Focus.
Database management system is a computer software system that has been designed to manage databases, Oracle, DB2, Microsoft Access among others are examples of DBMS.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
An perspective into the raise of NoSQL systems and an comparison between RDBMS and NoSQL technologies.
The basic idea of the presentation originated while trying to understand the different alternatives available for managing data while building a fast, highly scalable, available, and reliable enterprise application.
A database is an organized collection of data. The data are typically organized to model relevant aspects of reality in a way that supports processes requiring this information.
Data
Data is a collection of facts, such as numbers, words, measurements, observations or even just descriptions of things.
Data can be qualitative or quantitative.
Information
Information is data that has been processed in such a way as to be meaningful to the person who receives it.
it is any thing that is communicated.
DBMS - Database Management System, Introduction, Data and Database, DBMS meaning, Why DBMS?, History of DBMS, Characteristics of DBMS, Types of DBMS- Hierarchical DBMS, Network DBMS, Relational DBMS, Object-oriented DBMS, Applications of DBMS, Popular DBMS Software, Advantages of DBMS, disadvantages of DBMS.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
3. Page 3
What is data, information, & Database?
Data is a collection of facts, such as values or measurements.
It can be numbers, words, measurements, observations or
even just descriptions of things.
Data is information or facts that are collected to give a bigger
picture of things.
Information has meaning in some context for its receiver
A database is a collection of information that is organized
so that it can easily be accessed, managed, and updated
4. Page 4
What is DBMS?
DBMS is the data base management system which is
responsible for the storage of the data. Through this the
storage of data had been quite easy and the data that had
been stored can be easily modified and extracted too. This
in fact is the collection of the storing, executing, processing
and modifying the data.
DBMS contains information about a particular enterprise
Collection of interrelated data
Set of programs to access the data
An environment that is both convenient and efficient to use
6. Page 6
Drawbacks of using file systems
Data redundancy and inconsistency
Multiple file formats, duplication of information in different files
Difficulty in accessing data
Need to write a new program to carry out each new task
Data isolation — multiple files and formats
Integrity problems
Integrity constraints (e.g., account balance > 0) become
“buried” in program code rather than being stated explicitly
Hard to add new constraints or change existing ones
Atomicity of updates
Failures may leave database in an inconsistent state with partial
updates carried out
Example: Transfer of funds from one account to another should
either complete or not happen at all
7. Page 7
Drawbacks of using file systems
Concurrent access by multiple users
Concurrent access needed for performance
Uncontrolled concurrent accesses can lead to inconsistencies
Example: Two people reading a balance (say 100) and updating
it by withdrawing money (say 50 each) at the same time
Security problems
Hard to provide user access to some, but not all, data
Database systems (DBMS) offer solutions to all the above
problems
8. Page 8
What is RDBMS?
RDBMS is a database management system based on
relational model defined by E. F. Codd. Data is stored in the
form of rows and columns. The relations among tables are
also stored in the form of the table.
Features: Provides data to be stored in tables
• Persists data in the form of rows and columns
• Provides facility primary key, to uniquely identify the rows
• Creates indexes for quicker data retrieval
• Provides a virtual table creation in which sensitive data can
be stored and simplified query can be applied.(views)
• Sharing a common column in two or more tables(primary key
and foreign key)
• Provides multi user accessibility that can be controlled by
individual users
9. Page 9
What are E. F. Codd rules?
Also called Codd's Law, a set of 13 rules used to determine if a
DBMS can be considered a relational DBMS (RDBMS). In
1985, Dr. E. F. Codd first published this list of rules that
became a standard way of evaluating a relational system.
The rules have since been expanded by others, and after
publishing the original article Codd stated that there are no
systems that will satisfy every rule. Following are Codd's
original 13 rules:
0. Often referred to as rule 0, this rule states that all
subsequent rules are based on the notion that in order for a
database to be considered relational, it must use its
relational facilities exclusively to manage the database.
1. The Information rule: All information in an RDBMS is
represented logically in just one way - by values in tables.
10. Page 10
What are E. F. Code rules?
2. The Guaranteed Access rule: Each item of data in an RDBMS
is guaranteed to be logically accessible by resorting to a
combination of table name, primary key value, and column
name.
3. The Systematic Treatment of Null Values rule: Null values
(distinct from an empty character string or a string of blank
characters and distinct from zero or any other number) are
supported in a fully relational DBMS for representing missing
information and inapplicable information in a systematic way,
independent of the data type.
4. The Dynamic Online Catalog Based on the Relational Model
rule: The database description is represented at the logical
level in the same way as ordinary data, so that authorized
users can apply the same relational language to its
interrogation as they apply to the regular data.
11. Page 11
What are E. F. Code rules?
5. The Comprehensive Data Sublanguage rule: A relational
system may support several languages and various modes of
terminal use (for example, the fill-in-blanks mode). However,
there must be at least one language whose statements are
expressible, per some well-defined syntax, as character strings
and whose ability to support all of the following is
comprehensible: data definition, view definition, data
manipulation (interactive and by program), integrity
constraints, and transaction boundaries (begin, commit, and
rollback).
6. The View updating rule: All views of the data which are
theoretically updatable must be updatable in practice by the
DBMS.
7. The High-level Insert, Update, and Delete rule: The capability
of handling a base relation or a derived relation as a single
operand applies not only to the retrieval of data but also to the
insertion, update, and deletion of data.
12. Page 12
What are E. F. Code rules?
8. The Physical Data Independence rule: Application programs
and terminal activities remain logically unimpaired whenever
any changes are made in either storage representations or
access methods.
9. The Logical Data Independence rule: Application programs
and terminal activities remain logically unimpaired when
information preserving changes of any kind that theoretically
permit un-impairment are made to the base tables.
10. The Integrity Independence rule: Integrity constraints must
be definable in the RDBMS sub-language and stored in the
system catalogue and not within individual application
programs.
13. Page 13
What are E. F. Code rules?
11. The Distribution Independence rule: An RDBMS has
distribution independence. Distribution independence implies
that users should not have to be aware of whether a database
is distributed.
12. The Non-subversion rule: If the database has any means of
handling a single record at a time, that low-level language must
not be able to subvert or avoid the integrity rules which are
expressed in a higher-level language that handles multiple
records at a time
14. Page 14
SQL
SQL: widely used non-procedural language
• Example: Find the name of the instructor with ID 22222
select name
from instructor
where instructor.ID = ‘22222’
Application programs generally access databases through
one of
• Language extensions to allow embedded SQL
• Application program interface (e.g., ODBC/JDBC) which allow SQL
queries to be sent to a database
Two classes of languages
• Procedural – user specifies what data is required and how to get
those data
• Declarative (nonprocedural) – user specifies what data is required
without specifying how to get those data
15. Page 15
Data Manipulation Language (DML)
Language for accessing and manipulating the data
organized by the appropriate data model
• DML also known as query language
16. Page 16
Data Definition Language (DDL)
Specification notation for defining the database schema
DDL compiler generates a set of table templates stored in a
data dictionary
Data dictionary contains metadata (i.e., data about data)
• Database schema
• Integrity constraints
– Primary key (ID uniquely identifies instructors)
– Referential integrity (references constraint in SQL)
• Authorization
Difference between Schema & User?
• HR Schema, Finance Schema, MFG…
17. Page 17
Database Objects
Object Description
Table Basic unit of storage; composed of rows
and columns
View Logically represents subsets of data from
one or more tables
Sequence Numeric value generator
Index Improves the performance of some queries
Synonym Gives alternative names to objects
18. Data Types
Data Type Description
VARCHAR2(size) Variable length character data (32767
characters)
CHAR(size) Fixed Length Character data up to 2000
characters
NUMBER(p,s)
Variable length numeric data
DATE Date and time values
LONG Variable length character data up to 2GB
CLOB Character data up to 4GB
19. Page 19
Data Model
A database model is a theory or specification describing how a
database is structured and used.
A collection of tools for describing
• Data
• Data relationships
• Data semantics
• Data constraints
Entity-Relationship data model
Object-based data models
Semi-structured data model (XML)
Other older models:
• Network model
• Hierarchical model
20. Page 20
Database Design
The process of designing the general structure of the
database:
Logical Design – Deciding on the database schema. Database
design requires that we find a “good” collection of relation
schemas.
• Business decision – What attributes should we record in the
database?
• Computer Science decision – What relation schemas should we
have and how should the attributes be distributed among the various
relation schemas?
Physical Design – Deciding on the physical layout of the
database
21. Design Approach
Normalization Theory: Database
normalization is usually performed when
designing a relational database
Entity Relationship Model: ERD is the
commonly used system of diagramming,
for visual representation of the relational
model
22. Normalization
Objective
Eliminating redundant data (for example, storing the
same data in more than one table)
Ensuring data dependencies make sense (only
storing related data in a table).
Normalization typically involves decomposing an
un-normalized table into two or more tables that,
were they to be combined (joined), would convey
exactly the same information as the original
table.
You'll often see 1NF, 2NF, and 3NF along with the
occasional 4NF.
23. Normalization Example
First Form: For a table to be in first normal form, all repeating groups
must be moved to a new table. Consider the example in Figure, in which
several office location columns have been added to the EMPLOYEE
table.
24. Normalization Example
Second Form: Second normal form is a special-case normal form that
has to do with tables that have composite primary keys. A composite
primary key includes two or more columns. In second normal form, all
nonkey columns must depend on the entire primary key.
The EMPLOYEE_OFFICE_LOCATION table in Figure is in violation of
second normal form. For this table to comply with second normal form,
another table must be created and the OFFICE_PHONE_NUMBER data
must be moved to the new table.
25. Normalization Example
Third Form: Third normal form expands on second normal form. It
dictates that every nonkey column must be a detail or a fact about the
primary key. Figure illustrates a third normal form violation.
The addition of the DEPT_NAME column in this EMPLOYEE table
violates third normal form in that DEPT_NAME is dependent on the
DEPT_ID value, not the EMPLOYEE_ID value. Complying with the rules
of third normal form necessitates creating another table and moving the
department name values into this new table, with a foreign key reference
from the EMPLOYEE table to the new table.
26. Page 26
The Entity-Relationship Model
Models an enterprise as a collection of entities and
relationships
• Entity: a “thing” or “object” in the enterprise that is distinguishable
from other objects, described by a set of attributes
• Attributes: All information about Entity
• Relationship: an association among several entities
Represented diagrammatically by an entity-relationship
diagram:
27. Degrees of a Relationship
HusbandHusband WifeWife
Father ChildChild
BrotherBrother SisterSister
One-to-one (1:1)
One-to-many (1:n)
Many-to-many (n:m)
28. Many to One Mapping
CUSTOMER
TAKES
LOAN HAS REPAYMENT
C_ID C_NAME
LOAN_ID
LN_AMT
DT_OF_LOAN EMI_AMT
CHEQUE_ID
CHEQUE_DATE
CHEQUE_AMT
1 M
M
M
30. Page 32
Storage Management
Storage manager is a program module that provides the
interface between the low-level data stored in the database
and the application programs and queries submitted to the
system.
The storage manager is responsible to the following tasks:
• Interaction with the file manager
• Efficient storing, retrieving and updating of data
34. Oracle Products
Oracle Databases
Oracle Application Server
Oracle applications
Oracle Collaboration Suite
Oracle Developer Suite
35. Oracle Database 10g: “g” Stands for Grid
Oracle’s grid infrastructure:
• Low cost
• High quality of service
• Easy to manage
Automatic
Storage
Management
Real
Application
Clusters
Oracle
Streams
Enterprise
Manager
Grid Control
Storage
grid
Database
grid
Application
grid
Grid
control
36. Oracle RDBMS Architecture
There are three main components:
1. Instance
- Instance memory/System Global Area (SGA)
- Back ground process
2. Database
- Data files
- Control Files
- Redo log files
3. Other Components
- Other process
- Other memory (PGA)
- Other files
41. Page 43
QUIZ
1. RDBMS?
Relational Database Management System
2. SQL?
Structured Query Language
3. Relational model defined by?
E. F. Codd
4. ER Model?
Entity-Relationship Model
5. Design Approach to reduce Duplication?
Normalization
Editor's Notes
Oracle Products
Oracle databases: The Oracle database is the first database that is designed for enterprise grid computing (the most flexible and cost-effective way to manage information and applications).
Oracle Application Server: Oracle’s Java 2 Platform, Enterprise Edition (J2EE)–certified server integrates everything that is needed to develop and deploy Web-based applications. The application server deploys e-business portals, Web services, and transactional applications, including PL/SQL, Oracle Forms, and J2EE-based applications.
Oracle applications: Oracle E-Business Suite is a complete set of business applications for managing and automating processes across your organization.
Oracle Collaboration Suite: Oracle Collaboration Suite is a single, integrated system for all your organization’s communications data: voice, e-mail, fax, wireless, calendar information, and files.
Oracle Developer Suite: Oracle Developer Suite is a complete, integrated environment that combines application development and business intelligence tools.
Oracle Database 10g: “g” Stands for Grid
Global Grid Forum (GGF) is a standards body that develops standards for grid computing. It comprises a set of committees and working groups that focus on various aspects of grid computing. The committees and working groups are composed of participants from academia, the research community, and (increasingly) commercial companies. You can see the Web site of GGF at http://www.gridforum.org.
Oracle has created the grid computing infrastructure software that balances all types of workloads across servers and enables all those servers to be managed as one complete system. Grid computing can achieve the same very high level of reliability as mainframe computing because all components are clustered. But unlike mainframes and large UNIX symmetric multiprocessing (SMP) servers, a grid can be built with open system technologies, such as Intel processors and the Linux operating system, at a very low cost.
Oracle’s grid computing technology includes:
Automatic Storage Management (ASM)
Real Application Clusters (RAC)
Oracle Streams
Enterprise Manager Grid Control
Oracle Database 10g: “g” Stands for Grid (continued)
Automatic Storage Management spreads database data across all disks, creates and maintains a storage grid, and provides the highest input/output (I/O) throughput with minimal management costs. As disks are added or dropped, ASM redistributes the data automatically. (There is no need for a logical volume manager to manage the file system.) Data availability increases with optional mirroring, and you can add or drop disks online. For more information, see the lesson titled “Managing Database Storage Structures.”
Oracle’s Real Application Clusters runs and scales all application workloads on a cluster of servers and offers the following features:
Integrated clusterware: This includes functionality for cluster connectivity, messaging and locking, cluster control, and recovery. It is available on all platforms that are supported by Oracle Database 10g.
Automatic workload management: Rules can be defined to automatically allocate processing resources to each service both during normal operations and in response to failures. These rules can be dynamically modified to meet the changing business needs. This dynamic resource allocation within a database grid is unique to Oracle RAC.
Automatic event notification to the mid-tier: When a cluster configuration changes, the mid-tier can immediately adapt to instance failover or availability of a new instance. This enables end users to continue working in the event of instance failover without the delays typically caused by network timeouts. In the event of new instance availability, the mid-tier can immediately start load balancing connections to that instance. Oracle Database 10g Java Database Connectivity (JDBC) drivers have the “fast connection failover” functionality that can be automatically enabled to handle these events.
Oracle Streams provides a unified framework for information sharing, combining message queuing, data replication, event notification, data warehouse loading, and publishing and subscribing functionality into a single technology. Oracle Streams can keep two or more data source copies synchronized when updates are applied at either site. It can automatically capture database changes, propagate the changes to subscribing nodes, apply changes, and detect and resolve data update conflicts. Oracle Streams can be used directly by applications as a message-queuing or workflow feature, enabling communications between applications in the grid.
Enterprise Manager Grid Control manages gridwide operations that include managing the entire stack of software, provisioning users, cloning databases, and managing patches. It can monitor the performance of all applications from the point of view of your end users. Grid Control views the performance and availability of the grid infrastructure as a unified whole rather than as isolated storage units, databases, and application servers. You can group hardware nodes, databases, and application servers into single logical entities and manage a group of targets as one unit.
Note: In this course, you use Enterprise Manager Database Console to manage one database at a time.
Oracle Instance Management
An Oracle database server consists of an Oracle database and an Oracle instance. An Oracle instance is made up of memory structures, known as the System Global Area (SGA), and background processes that handle much of the behind-the-scenes work involved in running an instance. The most common background processes are the following:
System Monitor (SMON): Performs crash recovery when the instance is started following a failure
Process Monitor (PMON): Performs process cleanup when a user process fails
Database Writer (DBWn): Writes modified blocks from the database buffer cache to the data files on the disk
Checkpoint (CKPT): Updates all the data files and control files of the database to indicate the most recent checkpoint
LogWriter (LGWR): Writes redo log entries to the disk
Archiver (ARCn): Copies redo log files to the archival storage when a log switch occurs
Oracle Products
Oracle databases: The Oracle database is the first database that is designed for enterprise grid computing (the most flexible and cost-effective way to manage information and applications).
Oracle Application Server: Oracle’s Java 2 Platform, Enterprise Edition (J2EE)–certified server integrates everything that is needed to develop and deploy Web-based applications. The application server deploys e-business portals, Web services, and transactional applications, including PL/SQL, Oracle Forms, and J2EE-based applications.
Oracle applications: Oracle E-Business Suite is a complete set of business applications for managing and automating processes across your organization.
Oracle Collaboration Suite: Oracle Collaboration Suite is a single, integrated system for all your organization’s communications data: voice, e-mail, fax, wireless, calendar information, and files.
Oracle Developer Suite: Oracle Developer Suite is a complete, integrated environment that combines application development and business intelligence tools.
Oracle Products
Oracle databases: The Oracle database is the first database that is designed for enterprise grid computing (the most flexible and cost-effective way to manage information and applications).
Oracle Application Server: Oracle’s Java 2 Platform, Enterprise Edition (J2EE)–certified server integrates everything that is needed to develop and deploy Web-based applications. The application server deploys e-business portals, Web services, and transactional applications, including PL/SQL, Oracle Forms, and J2EE-based applications.
Oracle applications: Oracle E-Business Suite is a complete set of business applications for managing and automating processes across your organization.
Oracle Collaboration Suite: Oracle Collaboration Suite is a single, integrated system for all your organization’s communications data: voice, e-mail, fax, wireless, calendar information, and files.
Oracle Developer Suite: Oracle Developer Suite is a complete, integrated environment that combines application development and business intelligence tools.