SlideShare a Scribd company logo
1 of 40
CSC271DatabaseSystems
Lecture # 1
Chapter 1 - Objectives
 Some common uses of database systems
 Characteristics of file-based systems
 Problems with file-based approach
 Meaning of the term database (DB)
 Meaning of the term Database
Management System (DBMS)
Chapter 1 - Objectives
 Typical functions of a DBMS.
 Major components of the DBMS
environment.
 Personnel involved in the DBMS
environment.
 History of the development of DBMSs.
 Advantages and disadvantages of DBMSs.
Examples of Database
Applications
 Purchases from the supermarket
 Purchases using your credit card
 Booking a holiday at the travel agents
 Using the local library
 Taking out insurance
 Renting a video
 Using the Internet
 Studying at university
File-Based Systems
 Early attempt to Computerize the manual
filing system
 Collection of application programs that
perform services for the end users (e.g.
reports).
 Each program defines and manages its
own data.
Manual Filing Systems
 Works well
while number of items to be stored is small
For only storage or retrieval functionality of
large number of items
File-Based Systems
 Consider DreamHome example for file-
based systems
Sales Department : responsible for selling
and renting of properties
Contract Department: responsible for
handling lease agreements
SalesDepartment
 PropertyForRent
(propertyNo, street, city, postcode, type, rooms, rent,
ownerNo)
 Client
(clientNo, fName, lName, telNo, preftype, maxRent)
 PrivateOwner
(ownerNo, fName, lName, address, telNo)
ownerNo fName lName address telNo
CO46 Joe Keogh … 01224-861212
CO87 Carol Farrel … 0141-357-7419
CO40 … … … …
CO93 … … … …
propertyNo street city postcode type rooms rent ownerNo
PA14 … Aberdeen … House 6 650 CO46
PL94 … London … Flat 4 400 CO87
PG4 … Glasgow … Flat 3 350 CO40
PG36 … Glasgow … Flat 3 375 CO93
PG21 … Glasgow … House 5 600 CO87
PG16 … Glasgow … Flat 4 450 CO93
PrivateOwner
PropertyForRent
clientNo fName lName telNo prefType maxRent
CR76 John Kay 0207-774-5632 Flat 425
CR56 Aline Stewart 0141-848-1825 Flat 350
CR74 Mike Ritchie 01475-392178 House 750
CR62 Mary Tregear 01224-196720 Flat 600
Client
ContractDepartment
 Lease
(leaseNo, propertyNo, clientNo, rent , paymentMethod,
deposit, paid, rentStart, rentFinish, duration)
 PropertyForRent
(propertyNo, street, city, postcode, type, rooms, rent)
 Client
(clientNo, fName, lName, telNo, preftype, maxRent)
Lease
leaseNo propertyNo clientNo rent --- rentStart rentFinish duration
10024 PA14 CR62 650 1-Jun-05 31-May-06 12
… … … … … … … …
propertyNo street city postcode type rooms rent
PA14 … Aberdeen … House 6 650
PL94 … London … Flat 4 400
PG4 … Glasgow … Flat 3 350
PG36 … Glasgow … Flat 3 375
PG21 … Glasgow … House 5 600
PG16 … Glasgow … Flat 4 450
PropertyForRent
clientNo fName lName telNo
CR76 John Kay 0207-774-5632
CR56 Aline Stewart 0141-848-1825
CR74 Mike Ritchie 01475-392178
CR62 Mary Tregear 01224-196720
Client
File-Based Processing
Limitations of File-Based
Approach
 Separation and isolation of data
 Each program maintains its own set of data.
 Users of one program may be unaware of potentially
useful data held by other programs.
 For example, if we want to produce a list of all houses
that match the requirements of the clients.
 Duplication of data
 Decentralized approach taken by each department.
 Same data is held by different programs.
 Wasted space and potentially different values and/or
different formats for the same item.
Limitations of File-Based
Approach..
 Data dependence
 File structure is defined in the program code.
 Incompatible file formats
 Programs are written in different languages, and so cannot
easily access each other’s files.
 Fixed Queries/Proliferation of application
programs
 Programs are written to satisfy particular functions.
 Any new requirement needs a new program.
Database Approach
 Arose because:
 Definition of data was embedded in application programs,
rather than being stored separately and independently.
 No control over access and manipulation of data beyond
that imposed by application programs.
 Result:
 the database and Database Management System (DBMS).
Database
 Shared collection of logically related data,
and a description of this data, designed to
meet the information needs of an
organization.
 System catalog (metadata) provides
description of data to enable program-
data independence.
 Logically related data comprises entities,
attributes, and relationships of an
organization’s information.
Database Management
System (DBMS)
 Asoftware system that enables users to
define, create, maintain, and control
access to the database.
 (Database) application program: a
computer program that interacts with
database by issuing an appropriate
request (SQLstatement) to the DBMS.
Database Management
System (DBMS)..
Database Approach
 Data definition language (DDL).
 Permits specification of data types, structures and any data
constraints.
 All specifications are stored in the database.
 Data manipulation language (DML).
 General enquiry facility (query language) of the data.
Database Approach..
 Controlled access to database may include
 Asecurity system
 Which prevents unauthorized users accessing the database
 An integrity system
 Which maintains the consistency of stored data
 Aconcurrency control system
 Which allows shared access of the database
 Arecovery control system
 Which restores the database to a previous consistent state in case of
hardware or software failure
 Auser-accessible catalog
 Which contains description of the data in the database
Views
 Allows each user to have his or her own
view of the database.
 Aview is essentially some subset of the
database.
Views - Benefits
 Reduce complexity
 Provide a level of security
 Provide a mechanism to customize the
appearance of the database
 Present a consistent, unchanging picture
of the structure of the database, even if
the underlying database is changed
Summary
 Introduction to DB and DBMS
 File-based systems and their limitations
 Database approach
Components of DBMS
Environment
Components of DBMS
Environment..
 Hardware
 Can range from a PC to a network of computers.
 Software
 DBMS, operating system, network software (if
necessary) and also the application programs.
 Data
Used by the organization and a description
of this data called the schema.
Components of DBMS
Environment..
 Procedures
 Instructions and rules that should be applied to the
design and use of the database and DBMS.
 People
Roles in the Database
Environment
 DataAdministrator (DA)
 Database planning
 Development and maintenance of standards, policies and procedures
 DatabaseAdministrator (DBA)
 Physical realization of the database
 Physical database design and implementation
 Security and integrity control
 Maintenance of the operational system
 Ensuring satisfactory performance of the applications for users
 Database Designers (Logical and Physical)
 Application Programmers
 End Users (naive and sophisticated)
History of Database
Systems
 Roots of the DBMS
Apollo moon-landing project, 1960s
NAA(NorthAmericanAviation), prime
contractor for the project
Developed a software GUAM (Generalized
UpdateAccess Method), hierarchical
In mid – 1960s IBM joined NAA, result was
IMS(Information Management System)
History of Database
Systems..
 IDS ( Integrated Data Store)
By General Electric, network, mid-1960
 CODASYL( Conference on Data Systems
Languages)
 DBTG (Data Base Task Group)
History of Database
Systems..
 DBTG proposal in 1971, components
The network schema: the logical
organization of the entire database as seen
by the DBA – which includes a definition of
the database name, the type of each record,
and the components of each record type.
The subschema: the part of the database as
seen by the user or application program;
A data management language to define the
data characteristics and the data structure,
and to manipulate the data.
History of Database
Systems..
 DBTG specified three languages
A schema Data Definition Language (DDL),
which enables the DBAto define the schema.
A subschema DDL, which allows the
application programs to define the parts of
the database they require.
A Data Manipulation Language (DML), to
manipulate the data.
History of Database
Systems..
 E. F. Codd, 1970
IBM Research Laboratory
Relational model
System R project by IBM’S San Jose
Research Laboratory California
 Result of this project
 Development of SQL
 Commercial relational DBMS products e.g. DB2,
SQL/DS from IBM, Oracle from Oracle Corp.
DBMS Generations
 First-generation
 Hierarchical and Network
 Second generation
 Relational
 Third generation
 Object-Relational
 Object-Oriented
Advantages of DBMSs
 Control of data redundancy
 Data consistency
 More information from the same amount of
data
 Sharing of data
 Improved data integrity (constraints)
 Improved security (authentication, rights)
 Enforcement of standards (data formats,
naming conventions, documentation etc.)
Advantages of DBMSs..
 Economy of scale (economical cost)
 Balance conflicting requirements
 Improved data accessibility and
responsiveness (ad hoc queries)
 Increased productivity (developer)
 Improved maintenance through data
independence
 Increased concurrency
Advantages of DBMSs..
 Improved backup and recovery services
Disadvantages of DBMSs
 Complexity
 Size (disk space for DBMS)
 Cost of DBMS
 Additional hardware costs
 Cost of conversion
 Performance
 Higher impact of a failure
Summary
 Introduction to DB and DBMS
 File-based systems and their limitations
 Database approach
 Components of the DBMS environment
 Roles in the DB environment
 History of DBMS
 Advantages/Disadvantages of DBMSs

More Related Content

Similar to databasesystemsconollyslide1-151102101031-lva1-app6892.pptx

Similar to databasesystemsconollyslide1-151102101031-lva1-app6892.pptx (20)

DBMS
DBMSDBMS
DBMS
 
27 fcs157al2
27 fcs157al227 fcs157al2
27 fcs157al2
 
Database Management system
Database Management systemDatabase Management system
Database Management system
 
Introduction to DBMS.pptx
Introduction to DBMS.pptxIntroduction to DBMS.pptx
Introduction to DBMS.pptx
 
Database Management System Introduction
Database Management System IntroductionDatabase Management System Introduction
Database Management System Introduction
 
data base manage ment
data base manage mentdata base manage ment
data base manage ment
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
data base management system (DBMS)
data base management system (DBMS)data base management system (DBMS)
data base management system (DBMS)
 
Database system
Database systemDatabase system
Database system
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
Db lecture 1
Db lecture 1Db lecture 1
Db lecture 1
 
Dbms
DbmsDbms
Dbms
 
Week 1
Week 1Week 1
Week 1
 
Database Concepts.ppt
Database Concepts.pptDatabase Concepts.ppt
Database Concepts.ppt
 
Computer lecture (1) m.nasir
Computer lecture (1) m.nasirComputer lecture (1) m.nasir
Computer lecture (1) m.nasir
 
Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
csedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfcsedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdf
 
Oracle archi ppt
Oracle archi pptOracle archi ppt
Oracle archi ppt
 
DATA BASE MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
DATA BASE  MANAGEMENT SYSTEM BY SAIKIRAN PANJALADATA BASE  MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
DATA BASE MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
 

More from salutiontechnology

Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxsalutiontechnology
 
Intrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention systemIntrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention systemsalutiontechnology
 
smart grid, traditional power grids.pptx
smart grid, traditional power grids.pptxsmart grid, traditional power grids.pptx
smart grid, traditional power grids.pptxsalutiontechnology
 
Information security software security presentation.pptx
Information security software security presentation.pptxInformation security software security presentation.pptx
Information security software security presentation.pptxsalutiontechnology
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,salutiontechnology
 
imageenhancementtechniques-140316011049-phpapp01 (1).pptx
imageenhancementtechniques-140316011049-phpapp01 (1).pptximageenhancementtechniques-140316011049-phpapp01 (1).pptx
imageenhancementtechniques-140316011049-phpapp01 (1).pptxsalutiontechnology
 
Big data analytics with R tool.pptx
Big data analytics with R tool.pptxBig data analytics with R tool.pptx
Big data analytics with R tool.pptxsalutiontechnology
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxsalutiontechnology
 

More from salutiontechnology (13)

Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
 
Intrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention systemIntrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention system
 
smart grid, traditional power grids.pptx
smart grid, traditional power grids.pptxsmart grid, traditional power grids.pptx
smart grid, traditional power grids.pptx
 
Information security software security presentation.pptx
Information security software security presentation.pptxInformation security software security presentation.pptx
Information security software security presentation.pptx
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Distributed Systems.pptx
Distributed Systems.pptxDistributed Systems.pptx
Distributed Systems.pptx
 
3.pptx
3.pptx3.pptx
3.pptx
 
new.pptx
new.pptxnew.pptx
new.pptx
 
imageenhancementtechniques-140316011049-phpapp01 (1).pptx
imageenhancementtechniques-140316011049-phpapp01 (1).pptximageenhancementtechniques-140316011049-phpapp01 (1).pptx
imageenhancementtechniques-140316011049-phpapp01 (1).pptx
 
aip.pptx
aip.pptxaip.pptx
aip.pptx
 
Big data analytics with R tool.pptx
Big data analytics with R tool.pptxBig data analytics with R tool.pptx
Big data analytics with R tool.pptx
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptx
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

databasesystemsconollyslide1-151102101031-lva1-app6892.pptx

  • 2. Chapter 1 - Objectives  Some common uses of database systems  Characteristics of file-based systems  Problems with file-based approach  Meaning of the term database (DB)  Meaning of the term Database Management System (DBMS)
  • 3. Chapter 1 - Objectives  Typical functions of a DBMS.  Major components of the DBMS environment.  Personnel involved in the DBMS environment.  History of the development of DBMSs.  Advantages and disadvantages of DBMSs.
  • 4. Examples of Database Applications  Purchases from the supermarket  Purchases using your credit card  Booking a holiday at the travel agents  Using the local library  Taking out insurance  Renting a video  Using the Internet  Studying at university
  • 5. File-Based Systems  Early attempt to Computerize the manual filing system  Collection of application programs that perform services for the end users (e.g. reports).  Each program defines and manages its own data.
  • 6. Manual Filing Systems  Works well while number of items to be stored is small For only storage or retrieval functionality of large number of items
  • 7. File-Based Systems  Consider DreamHome example for file- based systems Sales Department : responsible for selling and renting of properties Contract Department: responsible for handling lease agreements
  • 8. SalesDepartment  PropertyForRent (propertyNo, street, city, postcode, type, rooms, rent, ownerNo)  Client (clientNo, fName, lName, telNo, preftype, maxRent)  PrivateOwner (ownerNo, fName, lName, address, telNo)
  • 9. ownerNo fName lName address telNo CO46 Joe Keogh … 01224-861212 CO87 Carol Farrel … 0141-357-7419 CO40 … … … … CO93 … … … … propertyNo street city postcode type rooms rent ownerNo PA14 … Aberdeen … House 6 650 CO46 PL94 … London … Flat 4 400 CO87 PG4 … Glasgow … Flat 3 350 CO40 PG36 … Glasgow … Flat 3 375 CO93 PG21 … Glasgow … House 5 600 CO87 PG16 … Glasgow … Flat 4 450 CO93 PrivateOwner PropertyForRent
  • 10. clientNo fName lName telNo prefType maxRent CR76 John Kay 0207-774-5632 Flat 425 CR56 Aline Stewart 0141-848-1825 Flat 350 CR74 Mike Ritchie 01475-392178 House 750 CR62 Mary Tregear 01224-196720 Flat 600 Client
  • 11. ContractDepartment  Lease (leaseNo, propertyNo, clientNo, rent , paymentMethod, deposit, paid, rentStart, rentFinish, duration)  PropertyForRent (propertyNo, street, city, postcode, type, rooms, rent)  Client (clientNo, fName, lName, telNo, preftype, maxRent)
  • 12. Lease leaseNo propertyNo clientNo rent --- rentStart rentFinish duration 10024 PA14 CR62 650 1-Jun-05 31-May-06 12 … … … … … … … … propertyNo street city postcode type rooms rent PA14 … Aberdeen … House 6 650 PL94 … London … Flat 4 400 PG4 … Glasgow … Flat 3 350 PG36 … Glasgow … Flat 3 375 PG21 … Glasgow … House 5 600 PG16 … Glasgow … Flat 4 450 PropertyForRent
  • 13. clientNo fName lName telNo CR76 John Kay 0207-774-5632 CR56 Aline Stewart 0141-848-1825 CR74 Mike Ritchie 01475-392178 CR62 Mary Tregear 01224-196720 Client
  • 15. Limitations of File-Based Approach  Separation and isolation of data  Each program maintains its own set of data.  Users of one program may be unaware of potentially useful data held by other programs.  For example, if we want to produce a list of all houses that match the requirements of the clients.  Duplication of data  Decentralized approach taken by each department.  Same data is held by different programs.  Wasted space and potentially different values and/or different formats for the same item.
  • 16. Limitations of File-Based Approach..  Data dependence  File structure is defined in the program code.  Incompatible file formats  Programs are written in different languages, and so cannot easily access each other’s files.  Fixed Queries/Proliferation of application programs  Programs are written to satisfy particular functions.  Any new requirement needs a new program.
  • 17. Database Approach  Arose because:  Definition of data was embedded in application programs, rather than being stored separately and independently.  No control over access and manipulation of data beyond that imposed by application programs.  Result:  the database and Database Management System (DBMS).
  • 18. Database  Shared collection of logically related data, and a description of this data, designed to meet the information needs of an organization.  System catalog (metadata) provides description of data to enable program- data independence.  Logically related data comprises entities, attributes, and relationships of an organization’s information.
  • 19. Database Management System (DBMS)  Asoftware system that enables users to define, create, maintain, and control access to the database.  (Database) application program: a computer program that interacts with database by issuing an appropriate request (SQLstatement) to the DBMS.
  • 21. Database Approach  Data definition language (DDL).  Permits specification of data types, structures and any data constraints.  All specifications are stored in the database.  Data manipulation language (DML).  General enquiry facility (query language) of the data.
  • 22. Database Approach..  Controlled access to database may include  Asecurity system  Which prevents unauthorized users accessing the database  An integrity system  Which maintains the consistency of stored data  Aconcurrency control system  Which allows shared access of the database  Arecovery control system  Which restores the database to a previous consistent state in case of hardware or software failure  Auser-accessible catalog  Which contains description of the data in the database
  • 23. Views  Allows each user to have his or her own view of the database.  Aview is essentially some subset of the database.
  • 24. Views - Benefits  Reduce complexity  Provide a level of security  Provide a mechanism to customize the appearance of the database  Present a consistent, unchanging picture of the structure of the database, even if the underlying database is changed
  • 25. Summary  Introduction to DB and DBMS  File-based systems and their limitations  Database approach
  • 27. Components of DBMS Environment..  Hardware  Can range from a PC to a network of computers.  Software  DBMS, operating system, network software (if necessary) and also the application programs.  Data Used by the organization and a description of this data called the schema.
  • 28. Components of DBMS Environment..  Procedures  Instructions and rules that should be applied to the design and use of the database and DBMS.  People
  • 29. Roles in the Database Environment  DataAdministrator (DA)  Database planning  Development and maintenance of standards, policies and procedures  DatabaseAdministrator (DBA)  Physical realization of the database  Physical database design and implementation  Security and integrity control  Maintenance of the operational system  Ensuring satisfactory performance of the applications for users  Database Designers (Logical and Physical)  Application Programmers  End Users (naive and sophisticated)
  • 30. History of Database Systems  Roots of the DBMS Apollo moon-landing project, 1960s NAA(NorthAmericanAviation), prime contractor for the project Developed a software GUAM (Generalized UpdateAccess Method), hierarchical In mid – 1960s IBM joined NAA, result was IMS(Information Management System)
  • 31. History of Database Systems..  IDS ( Integrated Data Store) By General Electric, network, mid-1960  CODASYL( Conference on Data Systems Languages)  DBTG (Data Base Task Group)
  • 32. History of Database Systems..  DBTG proposal in 1971, components The network schema: the logical organization of the entire database as seen by the DBA – which includes a definition of the database name, the type of each record, and the components of each record type. The subschema: the part of the database as seen by the user or application program; A data management language to define the data characteristics and the data structure, and to manipulate the data.
  • 33. History of Database Systems..  DBTG specified three languages A schema Data Definition Language (DDL), which enables the DBAto define the schema. A subschema DDL, which allows the application programs to define the parts of the database they require. A Data Manipulation Language (DML), to manipulate the data.
  • 34. History of Database Systems..  E. F. Codd, 1970 IBM Research Laboratory Relational model System R project by IBM’S San Jose Research Laboratory California  Result of this project  Development of SQL  Commercial relational DBMS products e.g. DB2, SQL/DS from IBM, Oracle from Oracle Corp.
  • 35. DBMS Generations  First-generation  Hierarchical and Network  Second generation  Relational  Third generation  Object-Relational  Object-Oriented
  • 36. Advantages of DBMSs  Control of data redundancy  Data consistency  More information from the same amount of data  Sharing of data  Improved data integrity (constraints)  Improved security (authentication, rights)  Enforcement of standards (data formats, naming conventions, documentation etc.)
  • 37. Advantages of DBMSs..  Economy of scale (economical cost)  Balance conflicting requirements  Improved data accessibility and responsiveness (ad hoc queries)  Increased productivity (developer)  Improved maintenance through data independence  Increased concurrency
  • 38. Advantages of DBMSs..  Improved backup and recovery services
  • 39. Disadvantages of DBMSs  Complexity  Size (disk space for DBMS)  Cost of DBMS  Additional hardware costs  Cost of conversion  Performance  Higher impact of a failure
  • 40. Summary  Introduction to DB and DBMS  File-based systems and their limitations  Database approach  Components of the DBMS environment  Roles in the DB environment  History of DBMS  Advantages/Disadvantages of DBMSs