This document provides an overview of database management systems (DBMS). It discusses the objectives and features of DBMS, including organizing data in a structured way and storing data only once. Common applications of DBMS are also outlined, such as enterprise information systems, banking, universities, and telecommunications. The document then examines the purpose of using a DBMS to share and secure data. Key concepts like data models, database languages, and the relational database model are introduced at a high level.
These All Cloud Computing Architectures have been Discussed in this Lecture
Hypervisor Clustering Architecture
Load Balanced Virtual Server Instances Architecture
Non-Disruptive Service Relocation Architecture
Zero Downtime Architecture
Cloud Balancing Architecture
Resource Reservation Architecture
Dynamic Failure Detection and Recovery Architecture
Bare-Metal Provisioning Architecture
Rapid Provisioning Architecture
Storage Workload Management Architecture
It includes:
Introduction to Database Management System
DBMS vs File System
View of data
Data models
Database Languages: DML, DDL
Database users and administrators
Transaction Management
Database System Structure
Application architectures
Data modeling is a process used to define and analyze data requirements needed to support the business processes within the scope of corresponding information systems in organizations.
Components of DBMS describe what are the different parts that work together for creating, and managing the database that forms a complete system named DBMS(database management system). data refers to all the single items that are stored in the database. It needs to be secure and managed in this way so that only authenticated persons can use it and can make changes or store it in a very easy way.
These All Cloud Computing Architectures have been Discussed in this Lecture
Hypervisor Clustering Architecture
Load Balanced Virtual Server Instances Architecture
Non-Disruptive Service Relocation Architecture
Zero Downtime Architecture
Cloud Balancing Architecture
Resource Reservation Architecture
Dynamic Failure Detection and Recovery Architecture
Bare-Metal Provisioning Architecture
Rapid Provisioning Architecture
Storage Workload Management Architecture
It includes:
Introduction to Database Management System
DBMS vs File System
View of data
Data models
Database Languages: DML, DDL
Database users and administrators
Transaction Management
Database System Structure
Application architectures
Data modeling is a process used to define and analyze data requirements needed to support the business processes within the scope of corresponding information systems in organizations.
Components of DBMS describe what are the different parts that work together for creating, and managing the database that forms a complete system named DBMS(database management system). data refers to all the single items that are stored in the database. It needs to be secure and managed in this way so that only authenticated persons can use it and can make changes or store it in a very easy way.
Complete book Database management systems Handbook 3rd edition by Muhammad Sharif
#DBMS
#RDBMS
#DATABASE MANAGEMENT SYSTEMS HANDBOOK
#DATABASE COMPLETE BOOK HANDBOOK
DATABASE SYSTEMS BY MUHAMMAD SHARIF
DATABASE SYSTEMS HANDBOOK BY MUHAMMAD SHARIF
Complete book Database management systems Handbook 3rd edition by Muhammad Sharif
#DBMS
#RDBMS
#DATABASE MANAGEMENT SYSTEMS HANDBOOK
#DATABASE COMPLETE BOOK HANDBOOK
DATABASE SYSTEMS BY MUHAMMAD SHARIF
DATABASE SYSTEMS HANDBOOK BY MUHAMMAD SHARIF
Full book Database system Handbook 3rd edition by Muhammad Sharif
I'm DBA in SKMCHRC and I have did this book by title: Database systems handbook.
Its other names are: Database management systems, Database systems basic conecpts
Database services and Relational Database management systems handbook:
Author name is Muhammad Sharif.
#Database_systems_handbook
#Database_Management_Systems
#Relational Database_management systems
#DBMS
#RDBMS
Complete Full book Database system Handbook 3rd edition by Muhammad Sharif
I'm DBA in SKMCHRC and I have did this book by title: Database systems handbook.
Its other names are: Database management systems, Database systems basic conecpts
Database services and Relational Database management systems handbook:
Author name is Muhammad Sharif.
#Database_systems_handbook
#Database_Management_Systems
#Relational Database_management systems
#DBMS
#RDBMS
Complete book Database management systems Handbook 3rd edition by Muhammad Sharif
#DBMS
#RDBMS
#DATABASE MANAGEMENT SYSTEMS HANDBOOK
#DATABASE COMPLETE BOOK HANDBOOK
DATABASE SYSTEMS BY MUHAMMAD SHARIF
DATABASE SYSTEMS HANDBOOK BY MUHAMMAD SHARIF
TITLE: DATABASE SYSTEMS HANDBOOK
Muhammad Sharif (Database systems handbook)database administrator SKMCHRC Lahore, Pakistan
I'm writing this book. I'm Muhammad Sharif write a Database systems handbook about dbms, rdbms database management system abrivations.
I have core knowledge of database systems and its structure and database system administration too.
I thanks to all my reader who ack.
Thanks
I'm Muhammad Sharif Software engineer, SKMCHRC Lahore, Database systems handbook is written by Muhammad Sharif is pure RDBMS having all core knowledge of databases and its related subjects.
Muhammad Sharif Database systems handbook
This Database management system DBMS is written by Muhammad Sharif Software Engineer SKMCHRC Lahore
It include RDBMS and File system contents and Database system to advance Databases like DBA Concepts.
Database systems Handbook by Muhammad Sharif dba
I'm Muhammad Sharif software engineer/ Database administrator SKMCHRC lahore. I have written this book for my and public learning. It include whole about database systems and its learning handbook.
Its title: Database systems handbook.
People mostly search as Database systems handbook by Muhammad Sharif dba.
Thanking You.
#DATABASE_SYSTEMS_HANDBOOK
#MUHAMMAD SHARIF DBA DATABASE SYSTEMS HANDBOOK
Database management systems handbook by Muhammad Sharif
Other names are Database systems handbook
Database management systems
rdbms
dbms
relational database systems
I can write any type of database systems handbook.
Database systems Handbook by Muhammad Sharif dba
I'm Muhammad Sharif software engineer/ Database administrator SKMCHRC lahore. I have written this book for my and public learning. It include whole about database systems and its learning handbook.
Its title: Database systems handbook.
People mostly search as Database systems handbook by Muhammad Sharif dba.
Thanking You.
#DATABASE_SYSTEMS_HANDBOOK
#MUHAMMAD SHARIF DBA DATABASE SYSTEMS HANDBOOK
Muhammad Sharif handbook dbms Database systems Handbook.
Hey, Im muhammad sharif software engineer from skmchrc Lahore, I have dba knowledge and huge experience in this field.
I am writting this book in dbms database systems field. Covering knowlege of Database management, database systems and dba.
Title of this book is Database systems handbook.
Good book in the field of databases.
Database systems Handbook by Muhammad Sharif dba
I'm Muhammad Sharif software engineer/ Database administrator SKMCHRC lahore. I have written this book for my and public learning. It include whole about database systems and its learning handbook.
Its title: Database systems handbook.
People mostly search as Database systems handbook by Muhammad Sharif dba.
Thanking You.
#DATABASE_SYSTEMS_HANDBOOK
#MUHAMMAD SHARIF DBA DATABASE SYSTEMS HANDBOOK
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
4. DBMS
DBMS (Database Management Systems)?
Is a collection of interrelated data and a set of
programs to access those data.
The collection of data, usually referred to as
database, contains information relevant to an
enterprise.
4IBS Hyderabad
5. DBMS
Database systems are designed to manage
large bodies of information.
Management of data involves both defining
structures for storage of information and
providing mechanism for the manipulation of
information.
Ensures safety of information.
5IBS Hyderabad
8. DBMS features
1. It is well organized.
2. It is related.
3. It is accessible in different orders without
great difficulty.
4. It is stored only once.
8IBS Hyderabad
9. DBMS Applications
Databases are widely used –
1. Enterprise Information –
Sales – Customer, Product & Purchase information.
Accounting – Payments, Receipts, account
balances, assets and other accounting information.
HR – Employees information, salaries, payroll taxes
& benefits.
Manufacturing – Management of SCM, inventories
of items in warehouses & stores and ordered items.
Online retailers – Online order tracking generation,
maintenance of online product evaluation.
9IBS Hyderabad
10. DBMS Applications
2. Banking and Finance –
Banking – Customer information, account, loans,
banking transactions.
Credit card transactions – Purchases on credit
cards and generation of monthly statements.
Finance – information about holdings, sales, and
purchase of financial instruments such as stocks
and bonds.
10IBS Hyderabad
11. DBMS Applications
3. Universities – Student information, course
registrations and grades along with enterprise
information.
4. Airlines – Reservations and schedule
information.
Firstly use DBMS capabilities in a
geographically distributed manner.
11IBS Hyderabad
12. DBMS Applications
5. Telecommunication – records of calls made,
Billing information, record of prepaid calling
and balances, communication network
information.
12IBS Hyderabad
14. Purpose of DBMS
Database Approach –
Many programs and users can share data in
database.
Secures data so that authorized users can
access certain data.
14IBS Hyderabad
18. Views of Data - Abstraction
We know that the same thing, if viewed from
different angles produces difference sights.
Likewise, the database that we have created
already can have different aspects to reveal if
seen from different levels of abstraction.
Abstraction means the amount of detail you
want to hide.
18IBS Hyderabad
19. Views of Data – Abstraction Example
A computer reveals the minimum of its internal
details, when seen from outside.
We do not know what parts it is built with. This
is the highest level of abstraction.
If we open the computer case and look inside
at the hard disc, motherboard, CD drive, CPU
and RAM, we are in middle level of
abstraction. 19IBS Hyderabad
20. Views of Data – Abstraction Example
If we move on to open the hard disc and
examine its tracks, sectors and read-write
heads, we are at the lowest level of
abstraction.
In the same manner, the database can also be
viewed from different levels of abstraction to
reveal different levels of details. where no
details are invisible. 20IBS Hyderabad
22. Views of Data – Abstraction Levels
The word schema means arrangement (design) – how
we want to arrange things that we have to store.
The diagram above shows the three different schemas
used in DBMS, seen from different levels of
abstraction.
The collection of information stored in the database at
a particular moment is called an instance.
22IBS Hyderabad
23. Data Models
Data Models are nothing but Rules and
Standards that define how database organizes
data.
Different data models are –
1. Relational Model
2. Entity-Relationship Model
3. Object-Based Data Model
4. Semi structured Data Model
23IBS Hyderabad
24. Data Models
1. Relational Model – Collection of tables to
represent both data and the relationship
among those data.
Is Record based model.
24IBS Hyderabad
25. Data Models
2. Entity-Relationship Model : Collection of basic
objects called entities.
It is based on entities and its relationship.
25IBS Hyderabad
26. Data Models
3. Object-Based Data Model: Object oriented
programming has become the dominant
software development methodology.
It leads to develop an object oriented data
models which is extending the E-R model
with notions of encapsulation, methods
(functions) , and object entity.
26IBS Hyderabad
27. Data Models
4. Semi structured Data Model : This data
model permits the specification of data where
individual data items of the same type may
have different set of attributes.
The Extensible Markup Language (XML) is
widely used to represent semi structured
data.
27IBS Hyderabad
28. Database Languages
A DBMS provides a data-definition
language to specify the database
schema and a data-manipulation
language to express database queries
and updates.
Data-definition and data-manipulation
languages are parts of single database
language.
Ex. - SQL - Structured Query Language
28IBS Hyderabad
29. Database Languages
Data-Manipulation Languages- which
enables users to access or manipulate
data as organized by the appropriate
data model.
Access types (operations) – Retrieval,
Insertion, Deletion & Modification.
There are two types of DMLs.
1. Procedural DMLs – What & How (data).
2. Declarative (Non procedural) DMLs –
What.
29IBS Hyderabad
30. Database Languages
Data-Definition Language: Data
Definition Language (DDL) statements
are used to classify the database
structure or schema.
It is a type of language that allows the
DBA or user to depict and name those
entities, attributes, and relationships that
are required for the application along
with any associated integrity and security
constraints.
30IBS Hyderabad
31. Database Languages
Data-Definition Language: Here are the
lists of tasks that come under DDL-
CREATE – used to create objects in the database.
ALTER – used to alters the structure of the database.
DROP – used to delete objects from the database.
TRUNCATE – used to remove all records from a table,
including all spaces allocated for the records are
removed.
COMMENT – used to add comments to the data
dictionary.
RENAME – used to rename an object.
31IBS Hyderabad
32. Relational Database
The relational model is the theoretical basis of
relational databases which is a technique or
way of structuring data using relations, which
are grid-like mathematical structures
consisting of columns and rows.
Codd proposed the relational model for IBM.
32IBS Hyderabad
33. Relational Database
In the relational model, all data is logically
structured within relations i.e. tables.
Each relation has a name and is formed from
named attributes or columns of data.
Each tuple or row holds one value per
attribute.
The greatest strength of the relational model is
this simple logical structure that it forms. 33IBS Hyderabad
34. Relational Database
Objectives of Relational Model:
1. To allow a high degree of data independence.
2. To provide considerable grounds for dealing with
data semantics, reliability, and redundancy
problems.
3. To allow the expansion of set-oriented data
manipulation languages.
34IBS Hyderabad
36. Relational Database
Tables: Relational Model Terms -
Relation: A relation is a table with columns and
rows.
Attribute: An attribute is a named column of a
relation.
Domain: A domain is the set of allowable values for
one or more attributes.
Tuple: A tuple is a row of a relation.
36IBS Hyderabad
38. Relational Database
Data-Manipulation Language – The SQL query
language is nonprocedural.
A query takes as input several tables/table and
always return a single table.
SQL statement for finding the names of all
instructors in the History department.
38IBS Hyderabad
39. Relational Database
Data-Manipulation Language : -
The query specifies that those rows from the
table instructor where dept_name is History
must be retrieved and name attribute of these
rows must be displayed.
39IBS Hyderabad
41. Relational Database
Data-Manipulation Language : - Query may
involve information from more than one table.
This query finds the instructors ID and of all
the instructors associated with a department
name department with budget greater than
$95000. 41IBS Hyderabad
43. Relational Database
Data-Definition Language: SQL provides a rich
DDL that allows one to define tables, integrity
constraints, assertions, etc.
Following SQL DDL statement defines the
department table:
create table department
(dept_name char (20),
building char (15),
budget numeric (12,2));
43IBS Hyderabad
44. Relational Database
Database Access from Application
Programs:
SQL is a query language which deals with
creation and manipulation of data base and
data respectively.
SQL does not support actions like input from
user, output to display & network
communication.
Such actions and computations must be
written using general purpose languages like
C, C++, Java etc.
44IBS Hyderabad
45. Relational Database
Database Access from Application
Programs:
Application programs are programs that are
used to interact with the database for specific
application, like filling of the forms, doing
calculations, generation of reports, etc.
45IBS Hyderabad
46. Database Design
DBMS are designed to manage large bodies
of information.
These large bodies of information do not exist
in isolation.
Here DBMS plays only supporting role by
providing required information or service.
Database design mainly involves the design of
the database schema.
46IBS Hyderabad
47. Database Design
Design Process:
1. Database Conceptual Framework – data
requirements, database structure.
2. Data Needs of the prospective database users –
outcome of the this phase is specification of user
requirements.
3. The designer needs to choose a data model and
translates user requirements into conceptual
schema of the database.
4. The designer reviews the schema to confirm data
requirements and its conflicts; focus is on data &
its relationship.
47IBS Hyderabad
48. Database Design
Design Process:
5. A fully developed conceptual schema indicates
the functional requirements of the enterprise; at
this stage of conceptual design, the designer can
review the schema to ensure it meets functional
requirements.
6. Design to implementation can be taken into two
different ways – Logical design phase & Physical
design phase.
48IBS Hyderabad
49. Database Design
Design Process; Example -
Database design for a University: Points to be
considered.
The University is organized into departments
(dept_name, bulding, budget).
Each department has a list of courses it offers
(course_id, dept_name, credit, and prerequisites).
Instructors are identified by their unique ID (name,
dept_name, salary).
Students are identified by their unique ID (name,
dept_name, total_cred).
49IBS Hyderabad
50. Database Design
Design Process; Example -
Database design for a University: Points to be
considered.
The University maintains a list of classrooms
(building, room_number & room_capacity).
The university maintains a list of classes
(sections) taught (course_id, sec_id, year,
semester).
The department has a list of teaching assignments
specifying, for each instructor, the section the
instructor is teaching.
The University has a list of all student course
registration. 50IBS Hyderabad
51. Database Design
Design Process-
The Entity- Relationship Model – This model
uses a collection of basic objects, called
entities, and relationships among these
objects.
Ex. Person, bank account;
Entities are described in a database by a set
of attributes.
Ex. ID, name, and salary may describe
instructor from university.
51IBS Hyderabad
52. Database Design
Design Process-
The Entity- Relationship Model –
The external attribute ID is used to identify an
instructor uniquely.
A relationship is an association among several
entities.
Ex. A member relationship associates an
instructor with her department.
Entity set – same types of entities.
Relationship set – same type of relations.
52IBS Hyderabad
53. Database Design
Design Process-
The Entity- Relationship Model –
The overall logical structure (schema) of a
database can be expressed graphically by an
entity-relationship (E-R) diagram.
Several ways to draw these diagrams but most
popular is Unified Modeling Language (UML).
53IBS Hyderabad
55. Database Design
Design Process-
The Entity- Relationship Model –
Entity sets are represented by a rectangular
box with the entity set name in the header and
the attributes listed below it.
Relationship sets are represented by a
diamond connecting a pair of related entity
sets. The name of the relationship is placed
inside the diamond.
55IBS Hyderabad
56. Database Design
Design Process-
The Entity- Relationship Model –
In addition to entities and relationships, the E-
R model represents certain constraints to
which the contents of database must conform.
Mapping Cardinalities, which expresses the
number of entities to which another entity can
be associated via a relationship set.
56IBS Hyderabad
57. Database Design
Design Process-
Normalization: Another commonly used
method of designing Relational database is.
It creates schema to store information without
unnecessary redundancy and also allows us to
retrieve information easily.
The approach is to design schemas that are in
an appropriate normal forms.
57IBS Hyderabad
58. Database Design
Design Process-
Normalization: To determine whether a
relation schema is in one of the desirable
normal forms, we need additional information
about the real world.
Most commonly used approach is to use
functional dependencies.
58IBS Hyderabad
59. Database Design
Design Process-
Normalization: Example
bad database design consists of –
Repetition of Information.
Inability to represent certain information.
We shall discuss these problems with the help
of a modified database design for our
university example.
59IBS Hyderabad
61. Database Design
Design Process-
Normalization: Example.
Notice the present table contains repetition of
information with departments (building,
budget) – redundancy problem.
This redundancy leads to inconsistency in
managing database.
Another problem is “inability to represent
certain information”. (addition/deletion of
department without instructor is not possible).
61IBS Hyderabad
62. Data Storage and Querying
A database system is partitioned into modules
that deal with each of the responsibilities of the
overall system.
Functional Modules –
1. Storage Manager.
2. Query Processor Components.
62IBS Hyderabad
63. Data Storage and Querying
Storage Manager is important because
database typically require a large amount of
storage space.
63IBS Hyderabad
64. Data Storage and Querying
Main memory of computer cannot store this
much information, the information is stored on
disks.
Data are moved between disk and main
memory as needed.
Movement of data from disk to main memory
is slow relative to speed of CPU, therefore
database system structure the data so as to
minimize the need to move data between disk
and main memory.
64IBS Hyderabad
65. Data Storage and Querying
The query processor simplifies database
access facility.
It works at view level without understanding
the physical level implementation details.
Database system translates and updates the
queries written in nonprocedural language, at
logical level into an efficient sequence of
operations at physical level with the help of
query processor.
65IBS Hyderabad
66. Data Storage and Querying
Storage Manager: It provides interface
between the low-level data stored in database
and the application program and queries
submitted to the system.
Is responsible for the interaction with the file
manager supported by operating system.
It is also responsible for storing, retrieving, and
updating data in the database.
66IBS Hyderabad
67. Data Storage and Querying
Storage Manager Components:
1. Authorization and integrity Manager.
2. Transaction Manager.
3. File Manager.
4. Buffer Manager.
67IBS Hyderabad
68. Data Storage and Querying
Storage Manager data structures:
1. Data Files.
2. Data Dictionary.
3. Indices.
68IBS Hyderabad
69. Data Storage and Querying
The Query Processor Components:
1. DDL interpreter.
2. DML Compiler.
3. Query evaluation engine.
69IBS Hyderabad
70. Transaction Management
A transaction is a collection of operations that
performs a single logical function in a
database.
The transaction Management consists of the
Concurrency-control manager and the
recovery manager.
Each transaction is a unit of both atomicity and
consistency.
It is programmer’s responsibility to define
properly the various transactions, so that each
preserves the consistency of the database.
70IBS Hyderabad
71. Transaction Management
Recovery management ensures atomicity and
durability.
The database system must perform failure
recovery, that is, detect system failures and
restore the database to the state that existed
prior to the occurrence of the failure.
It is the responsibility of the concurrency-
control management to control the interaction
among the concurrent transactions, to ensure
the consistency of the database.
71IBS Hyderabad
74. Database Architecture
The architecture of a database system is
greatly influenced by the underlying computer
system on which the database system runs.
It can be centralized or client-server types.
It can also be designed to exploit parallel
computer architectures.
Distributed database span multiple
geographically separated machines.
ODBC & JDBC is used to provide interface
between client and sever.
74IBS Hyderabad
75. Database Users and Administrators
A primary goal of a database system is to
retrieve information from and store new
information into the database.
People who work with a database can be
categorized as database users or database
administrators.
75IBS Hyderabad
76. Database Users and Administrators
Four types of database Users – based on the
way they expect to interact with system.
1. Naïve User: Sophisticated users who
interacts with the system by invoking one of
the application programs.
Ex, - Clerk adds new record to the existing
database using program specifically designed
to add record.
A Form based user interface is preferred to
naive users.
76IBS Hyderabad
77. Database Users and Administrators
Four types of database Users – based on the
way they expect to interact with system.
2. Application Programmers: are computer
professionals who write application programs.
Rapid Application Development (RAD) tools
speeds up programming capabilities with
minimization of efforts to develop user
interfaces.
77IBS Hyderabad
78. Database Users and Administrators
Four types of database Users – based on the
way they expect to interact with system.
3. Sophisticated Users: interacts with the
system without writing programs.
Instead, they form their requests either using a
database query language or by using tools
such as data analysis software.
Analysts who submit queries to explore data in
the database fall in this category. 78IBS Hyderabad
79. Database Users and Administrators
Four types of database Users – based on the
way they expect to interact with system.
4. Specialized Users: are sophisticated users
who write specialized database applications
that do not fit into the traditional data-
processing framework.
Ex.- Computer Aided Design, Knowledge
based expert systems.
79IBS Hyderabad
80. Database Users and Administrators
Database Administrator: One of the main
reason for using DBMSs is to have central
control of both the data and the programs that
access those data.
A person who has such central control over
the system is called a database Administrator
(DBA).
80IBS Hyderabad
81. Database Users and Administrators
Database Administrator: Functions of a
DBA-
1. Schema definition – The DBA creates the
original database schema by executing a set
of data definition statements in the DDL.
2. Storage structure and access-method
definition –
3. Schema and physical-orginzation
modification -
81IBS Hyderabad
82. Database Users and Administrators
Database Administrator: Functions of a
DBA-
4. Granting of authorization for data access -
5. Routing maintenance – like, backup, free
space management, monitoring jobs and
performance of the database.
82IBS Hyderabad
83. Reviews
Database System Applications.
Purpose of Database systems.
View of Data.
Database Language.
Relational Database.
Database Design.
Database Architecture.
Database Users and DBA.
83IBS Hyderabad