SlideShare a Scribd company logo
Degree/s-quality

Data- raw facts

Abstract- concept

    “Data designer produced a quality data
 model”
   American National Standard Institute
    (ANSI) Standards Planning and Requirements
    Committee (SPARC)

Defined a framework for data modelling based
 on degrees of data abstraction.
Defines three levels of abstraction:

   external
   conceptual
   internal
   Is the end user’s view of the data
    environment.


   The term end user’s refers to the people who
    use the application programs to manipulate
    the data and generate information.
   A specific representation of an external view is
    known as an external schema.


   Each     external   schema       includes    the
    appropriateness      entities,     relationships,
    processes, and constraints imposed by the
    business unit.
   It makes it easy to identify specific data
    required to support each business unit’s
    operations.
   It makes the designer’s job easy by providing
    feedback about the model’s adequacy.
   It helps to ensure security constraints in the
    database    design.   Damaging     an    entire
    database is more difficult when each business
    unit works with only a subset of data.
   It makes application program development
    much simpler.
   The conceptual model represents as a global
    view of the entire database as viewed by the
    entire organization.
   Conceptual model integrates all external
    views (entities, relationships, constraints, and
    processes) into single global of a data.


   Also known as conceptual schema
   First, it provides a relatively easily bird’s eye
    (macro level) view of the data environment.
   Second, the conceptual model is independent
    of both software and hardware.
1.   Software independence means that the model
     does not depend on the DBMS software used
     to implement the model.


2.   Hardware independence means that the
     model does not depend on the hardware used
     in the implementation of the model.
   Generally, the term logical design is used to
    refer to the task of creating a conceptual data
    model that could be implemented in any
    DBMS.
   Once a specific DBMS has been selected, the
    internal model maps the conceptual model to
    the DBMS.
   The internal model is the representation of
    the database as seen by the DBMS.
   In other words, the internal model requires
    the designer to match the conceptual model’s
    characteristics and constraints to those of the
    selected implementation model.
   Internal model depends on specific database
    software, it is said to be the software
    dependent.
   Internal model is still hardware-independent
    because it is unaffected by the choice of the
    computer on which the software is installed.
   This lowest level of data abstraction is
    concerned exclusively with physical storage
    methods.
   Early data models forced the database
    designer to take the details of the physical
    model’s data storage requirements into
    account.
   However, the now dominant relational model
    is aimed largely at the logical rather than the
    physical level; therefore it does not require
    the physical-level details common to its
    predecessors.
Thanks!
Prepared by Me 
   Yours truly,

More Related Content

What's hot

Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
OECLIB Odisha Electronics Control Library
 
Database Design
Database Design Database Design
Database Design
Er. Nawaraj Bhandari
 
Lesson01 Database introduction
Lesson01 Database introductionLesson01 Database introduction
Lesson01 Database introduction
Muhammad Sikandar Mustafa
 
SAD ASSIGN :)
SAD ASSIGN :)SAD ASSIGN :)
SAD ASSIGN :)Roy Reyes
 
Class notes
Class notesClass notes
Introduction To Database Management System
Introduction To Database Management SystemIntroduction To Database Management System
Introduction To Database Management System
cpjcollege
 
System Analysis and Design (SAD)
System Analysis and Design (SAD)System Analysis and Design (SAD)
System Analysis and Design (SAD)
Sachith Perera
 
Data models
Data modelsData models
Data models
RituBhargava7
 
Database development progress(database)
Database development progress(database)Database development progress(database)
Database development progress(database)welcometofacebook
 
Dbms Notes Lecture 2 : Levels of Data Abstraction
Dbms Notes Lecture 2 : Levels of Data AbstractionDbms Notes Lecture 2 : Levels of Data Abstraction
Dbms Notes Lecture 2 : Levels of Data Abstraction
BIT Durg
 
Kskv kutch university DBMS unit 1 basic concepts, data,information,database,...
Kskv kutch university DBMS unit 1  basic concepts, data,information,database,...Kskv kutch university DBMS unit 1  basic concepts, data,information,database,...
Kskv kutch university DBMS unit 1 basic concepts, data,information,database,...
Dipen Parmar
 
Introduction to System analysis part1
Introduction to System analysis part1Introduction to System analysis part1
Introduction to System analysis part1
DrMohammed Qassim
 
Dbms basics 02
Dbms basics 02Dbms basics 02
Dbms basics 02
Jaipal Dhobale
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
Surbhi Panhalkar
 
SAD
SADSAD
Introduction: Databases and Database Users
Introduction: Databases and Database UsersIntroduction: Databases and Database Users
Introduction: Databases and Database Users
sontumax
 
Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering
arvind pandey
 

What's hot (20)

Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
Types dbms
Types dbmsTypes dbms
Types dbms
 
Database Design
Database Design Database Design
Database Design
 
Lesson01 Database introduction
Lesson01 Database introductionLesson01 Database introduction
Lesson01 Database introduction
 
SAD ASSIGN :)
SAD ASSIGN :)SAD ASSIGN :)
SAD ASSIGN :)
 
Class notes
Class notesClass notes
Class notes
 
Introduction To Database Management System
Introduction To Database Management SystemIntroduction To Database Management System
Introduction To Database Management System
 
System Analysis and Design (SAD)
System Analysis and Design (SAD)System Analysis and Design (SAD)
System Analysis and Design (SAD)
 
System design
System designSystem design
System design
 
ch1
ch1ch1
ch1
 
Data models
Data modelsData models
Data models
 
Database development progress(database)
Database development progress(database)Database development progress(database)
Database development progress(database)
 
Dbms Notes Lecture 2 : Levels of Data Abstraction
Dbms Notes Lecture 2 : Levels of Data AbstractionDbms Notes Lecture 2 : Levels of Data Abstraction
Dbms Notes Lecture 2 : Levels of Data Abstraction
 
Kskv kutch university DBMS unit 1 basic concepts, data,information,database,...
Kskv kutch university DBMS unit 1  basic concepts, data,information,database,...Kskv kutch university DBMS unit 1  basic concepts, data,information,database,...
Kskv kutch university DBMS unit 1 basic concepts, data,information,database,...
 
Introduction to System analysis part1
Introduction to System analysis part1Introduction to System analysis part1
Introduction to System analysis part1
 
Dbms basics 02
Dbms basics 02Dbms basics 02
Dbms basics 02
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
 
SAD
SADSAD
SAD
 
Introduction: Databases and Database Users
Introduction: Databases and Database UsersIntroduction: Databases and Database Users
Introduction: Databases and Database Users
 
Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering
 

Similar to Degrees of data abstraction copy

Degrees of data abstraction
Degrees of data abstractionDegrees of data abstraction
Degrees of data abstractionMary May Porto
 
Database Management system
Database Management systemDatabase Management system
Database Management system
Vijay Thorat
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1ahfiki
 
1-SDLC - Development Models – Waterfall, Rapid Application Development, Agile...
1-SDLC - Development Models – Waterfall, Rapid Application Development, Agile...1-SDLC - Development Models – Waterfall, Rapid Application Development, Agile...
1-SDLC - Development Models – Waterfall, Rapid Application Development, Agile...
JOHNLEAK1
 
P209 leithiser-relationaldb-formal-specifications
P209 leithiser-relationaldb-formal-specificationsP209 leithiser-relationaldb-formal-specifications
P209 leithiser-relationaldb-formal-specifications
Bob Leithiser
 
Physical Database Requirements.pdf
Physical Database Requirements.pdfPhysical Database Requirements.pdf
Physical Database Requirements.pdf
seifusisay06
 
Ems
EmsEms
Notes of DBMS Introduction to Database Design
Notes of DBMS Introduction to Database DesignNotes of DBMS Introduction to Database Design
Notes of DBMS Introduction to Database Design
AthiraNair143542
 
data design and component design.pptx
data design and component design.pptxdata design and component design.pptx
data design and component design.pptx
ubaidullah75790
 
Dbms unit i
Dbms unit iDbms unit i
Dbms unit i
Arnav Chowdhury
 
View of data DBMS
View of data DBMSView of data DBMS
View of data DBMS
Rahul Narang
 
Database Management System Introduction
Database Management System IntroductionDatabase Management System Introduction
Database Management System Introduction
Smriti Jain
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
DhruveeHalvadiya
 
DBMS.pptx
DBMS.pptxDBMS.pptx
Lecture1
Lecture1Lecture1
Lecture1
hassan340
 
Lecture 1 to 3intro to normalization in database
Lecture 1 to 3intro to  normalization in databaseLecture 1 to 3intro to  normalization in database
Lecture 1 to 3intro to normalization in database
maqsoodahmedbscsfkhp
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
Raj vardhan
 

Similar to Degrees of data abstraction copy (20)

Degrees of data abstraction
Degrees of data abstractionDegrees of data abstraction
Degrees of data abstraction
 
Dbms models
Dbms modelsDbms models
Dbms models
 
Database Management system
Database Management systemDatabase Management system
Database Management system
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
1-SDLC - Development Models – Waterfall, Rapid Application Development, Agile...
1-SDLC - Development Models – Waterfall, Rapid Application Development, Agile...1-SDLC - Development Models – Waterfall, Rapid Application Development, Agile...
1-SDLC - Development Models – Waterfall, Rapid Application Development, Agile...
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
P209 leithiser-relationaldb-formal-specifications
P209 leithiser-relationaldb-formal-specificationsP209 leithiser-relationaldb-formal-specifications
P209 leithiser-relationaldb-formal-specifications
 
Physical Database Requirements.pdf
Physical Database Requirements.pdfPhysical Database Requirements.pdf
Physical Database Requirements.pdf
 
Ems
EmsEms
Ems
 
Notes of DBMS Introduction to Database Design
Notes of DBMS Introduction to Database DesignNotes of DBMS Introduction to Database Design
Notes of DBMS Introduction to Database Design
 
data design and component design.pptx
data design and component design.pptxdata design and component design.pptx
data design and component design.pptx
 
Dbms unit i
Dbms unit iDbms unit i
Dbms unit i
 
View of data DBMS
View of data DBMSView of data DBMS
View of data DBMS
 
Database Management System Introduction
Database Management System IntroductionDatabase Management System Introduction
Database Management System Introduction
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Lecture1
Lecture1Lecture1
Lecture1
 
Lecture 1 to 3intro to normalization in database
Lecture 1 to 3intro to  normalization in databaseLecture 1 to 3intro to  normalization in database
Lecture 1 to 3intro to normalization in database
 
Dbms notesization 2014
Dbms notesization 2014Dbms notesization 2014
Dbms notesization 2014
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 

More from markilyn

Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.markilyn
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.markilyn
 
Database design challenges conflicting goals
Database design challenges conflicting goalsDatabase design challenges conflicting goals
Database design challenges conflicting goalsmarkilyn
 
Blogging report
Blogging reportBlogging report
Blogging report
markilyn
 
Bibliographies
Bibliographies Bibliographies
Bibliographies
markilyn
 
Security Procedures
Security ProceduresSecurity Procedures
Security Procedures
markilyn
 

More from markilyn (8)

Email (3)
Email (3)Email (3)
Email (3)
 
Dmbbb
DmbbbDmbbb
Dmbbb
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Database design challenges conflicting goals
Database design challenges conflicting goalsDatabase design challenges conflicting goals
Database design challenges conflicting goals
 
Blogging report
Blogging reportBlogging report
Blogging report
 
Bibliographies
Bibliographies Bibliographies
Bibliographies
 
Security Procedures
Security ProceduresSecurity Procedures
Security Procedures
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Degrees of data abstraction copy

  • 1.
  • 2. Degree/s-quality Data- raw facts Abstract- concept “Data designer produced a quality data model”
  • 3. American National Standard Institute (ANSI) Standards Planning and Requirements Committee (SPARC) Defined a framework for data modelling based on degrees of data abstraction.
  • 4. Defines three levels of abstraction:  external  conceptual  internal
  • 5.
  • 6. Is the end user’s view of the data environment.  The term end user’s refers to the people who use the application programs to manipulate the data and generate information.
  • 7. A specific representation of an external view is known as an external schema.  Each external schema includes the appropriateness entities, relationships, processes, and constraints imposed by the business unit.
  • 8.
  • 9. It makes it easy to identify specific data required to support each business unit’s operations.
  • 10. It makes the designer’s job easy by providing feedback about the model’s adequacy.
  • 11. It helps to ensure security constraints in the database design. Damaging an entire database is more difficult when each business unit works with only a subset of data.
  • 12. It makes application program development much simpler.
  • 13. The conceptual model represents as a global view of the entire database as viewed by the entire organization.
  • 14. Conceptual model integrates all external views (entities, relationships, constraints, and processes) into single global of a data.  Also known as conceptual schema
  • 15.
  • 16. First, it provides a relatively easily bird’s eye (macro level) view of the data environment.
  • 17.
  • 18. Second, the conceptual model is independent of both software and hardware.
  • 19. 1. Software independence means that the model does not depend on the DBMS software used to implement the model. 2. Hardware independence means that the model does not depend on the hardware used in the implementation of the model.
  • 20. Generally, the term logical design is used to refer to the task of creating a conceptual data model that could be implemented in any DBMS.
  • 21. Once a specific DBMS has been selected, the internal model maps the conceptual model to the DBMS.
  • 22. The internal model is the representation of the database as seen by the DBMS.
  • 23. In other words, the internal model requires the designer to match the conceptual model’s characteristics and constraints to those of the selected implementation model.
  • 24.
  • 25. Internal model depends on specific database software, it is said to be the software dependent.
  • 26. Internal model is still hardware-independent because it is unaffected by the choice of the computer on which the software is installed.
  • 27. This lowest level of data abstraction is concerned exclusively with physical storage methods.
  • 28. Early data models forced the database designer to take the details of the physical model’s data storage requirements into account.
  • 29. However, the now dominant relational model is aimed largely at the logical rather than the physical level; therefore it does not require the physical-level details common to its predecessors.
  • 30.
  • 31. Thanks! Prepared by Me  Yours truly,