This presentation contains content relevant to the introduction to the database management systems. The content is adapted from the original work of Abe Silberschatz et. al.
Distributed database system is collection of loosely coupled sites that are independeant of each other.
Distributed transaction model
Concurrency control
2 phase commit protocol
DBMS - Database Management System, Data and Database, DBMS meaning, Why DBMS?, Characteristics of DBMS, Types of DBMS- Hierarchical DBMS, Network DBMS, Relational DBMS, Object-oriented DBMS, Applications of DBMS, Popular DBMS Software, Advantages of DBMS, disadvantages of DBMS.
Chapter-1 Introduction to Database Management SystemsKunal Anand
This chapter discusses the fundamental concepts of DBMS like limitations of the traditional file processing systems, characteristics of the database approach, different types of databases and users, advantages and disadvantages of DBMS.
Introduction to database systems
Database size and complexity
What is DBMS?
Characteristics of Database approach
Users of database
Advantages of using database system
Database systems evolution
When not to use database systems
Distributed database system is collection of loosely coupled sites that are independeant of each other.
Distributed transaction model
Concurrency control
2 phase commit protocol
DBMS - Database Management System, Data and Database, DBMS meaning, Why DBMS?, Characteristics of DBMS, Types of DBMS- Hierarchical DBMS, Network DBMS, Relational DBMS, Object-oriented DBMS, Applications of DBMS, Popular DBMS Software, Advantages of DBMS, disadvantages of DBMS.
Chapter-1 Introduction to Database Management SystemsKunal Anand
This chapter discusses the fundamental concepts of DBMS like limitations of the traditional file processing systems, characteristics of the database approach, different types of databases and users, advantages and disadvantages of DBMS.
Introduction to database systems
Database size and complexity
What is DBMS?
Characteristics of Database approach
Users of database
Advantages of using database system
Database systems evolution
When not to use database systems
Database Management Systems - Management Information SystemNijaz N
A DBMS is software that:Acts as an interface between application programs and the data files.Helps to reduce data redundancy and eliminate data inconsistency by allowing a central, shared data source
Recovery Techniques and Need of RecoveryPooja Dixit
Recovery Techniques and Need of Recovery, 3 states of database Recovery:, DBMS Failure , Transaction Failure…, System Crash…, Disk Failure…,LOG BASED , CONCURRENT TRANSACTION, Checkpoint…
Understanding the Windows Server Administration Fundamentals (Part-2)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability. With these slides, explore the key fundamentals of the Windows Server Administration.
Learn more about:
» Storage technologies.
» File Systems.
» HDD managements.
» Troubleshooting methodology.
» Server boot process.
» System configuration.
» System monitoring.
» High Availability & fault tolerance.
» Back up.
=-=-=-==-=-Overview of the Talk-=-=-=-=-=
Introduction to the Subject
Database
Rational Database
Object Rational Database
Database Management System
History
Programming
SQL,
Connecting Java, Matlab to a Database
Advance DBMS
Data Grid
BigTable
Demo
Products
MySQL, SQLite, Oracle,
DB2, Microsoft Access,
Microsoft SQL Server
Products Comparison.
Computer Networks for Computer Science Studentrprajat007
Computer Networks Notes for CS/IT students
Topics:
1.Components of Data Communication
2. Distributed Processing
3. Standards and Organizations
4. Line Configuration
5. Topology
6. Transmission Mode
7. Categories of Networks
8. OSI and TCP/IP Models: Layers and their functions, comparison of models.
9. Digital Transmission: Interfaces and Modems: DTE-DCE Interface, Modems, Cable modems.
Database Management Systems - Management Information SystemNijaz N
A DBMS is software that:Acts as an interface between application programs and the data files.Helps to reduce data redundancy and eliminate data inconsistency by allowing a central, shared data source
Recovery Techniques and Need of RecoveryPooja Dixit
Recovery Techniques and Need of Recovery, 3 states of database Recovery:, DBMS Failure , Transaction Failure…, System Crash…, Disk Failure…,LOG BASED , CONCURRENT TRANSACTION, Checkpoint…
Understanding the Windows Server Administration Fundamentals (Part-2)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability. With these slides, explore the key fundamentals of the Windows Server Administration.
Learn more about:
» Storage technologies.
» File Systems.
» HDD managements.
» Troubleshooting methodology.
» Server boot process.
» System configuration.
» System monitoring.
» High Availability & fault tolerance.
» Back up.
=-=-=-==-=-Overview of the Talk-=-=-=-=-=
Introduction to the Subject
Database
Rational Database
Object Rational Database
Database Management System
History
Programming
SQL,
Connecting Java, Matlab to a Database
Advance DBMS
Data Grid
BigTable
Demo
Products
MySQL, SQLite, Oracle,
DB2, Microsoft Access,
Microsoft SQL Server
Products Comparison.
Computer Networks for Computer Science Studentrprajat007
Computer Networks Notes for CS/IT students
Topics:
1.Components of Data Communication
2. Distributed Processing
3. Standards and Organizations
4. Line Configuration
5. Topology
6. Transmission Mode
7. Categories of Networks
8. OSI and TCP/IP Models: Layers and their functions, comparison of models.
9. Digital Transmission: Interfaces and Modems: DTE-DCE Interface, Modems, Cable modems.
Introduction to Relational Database Management SystemsAdri Jovin
This presentation contains information relevant to the relational database management systems and the various operations that are performed over a relational database.
This presentation contains the concepts related to database design using ER Diagram. The content is adapted from the contents of the authors of the book mentioned in the reference.
Introduction to Artificial Neural NetworksAdri Jovin
This presentation describes the various components, classification and application of Artificial Neural Networks. It also gives an outline on the other soft computing techniques also.
This presentation gives an outline of the course Soft Computing, which is a Professional Elective offered by the Department of Information Technology, Sri Ramakrishna Institute of Technology, Coimbatore.
My presentation on Image-based Security prepared for the Faculty Development Programme on "Research Issues in Digital Image Processing". This covers the concepts of Visual Cryptography and is based on the book "Handbook of Image-based Security Techniques"
My presentation prepared for the one-day national level workshop on "Blockchain Technologies" organised by the Department of Information Technology, Academy of Maritime Education and Training. The presentation covers the definition, classification, components, structure and working of ethereum and bitcoin blockchains.
This presentation provides an introduction to cybersecurity. This presentation is a part of the Five days Faculty Development Program on Cybersecurity organized by the Department of Information Technology, Sri Ramakrishna Institute of Technology.
Advanced Encryption System & Block Cipher Modes of OperationsAdri Jovin
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Advanced Encryption Standard and the various block cipher moder of operations.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers a case study on the heartbleed bug, a major security issue faced by the internet community in 2014 due to implementation issues.
Zoom: Privacy and Security - A case studyAdri Jovin
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers a case study on security and privacy issues faced by Zoom, a prominent online cloud-based video conferencing application.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Elliptic Curve Cryptography and the basis of elliptic curve arithmetics.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the ElGamal Cryptosystem.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Data Encryption Standard and its variants.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the classical cryptographic techniques that were in practice and the basic concepts behind the design of Feistel ciphers
Mathematical Foundations of CryptographyAdri Jovin
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the basic concepts of mathematics that are essential to work with cryptography.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2. Database Systems
October 8, 2021 UITG004 2
• DBMS contains information about a particular enterprise
• Collection of interrelated data
• Set of programs to access the data
• An environment that is both convenient and efficient to use
• Database systems are used to manage collections of data that are:
• Highly valuable
• Relatively large
• Accessed by multiple users and applications, often at the same time.
• A modern database system is a complex software system whose task is to manage a large, complex
collection of data.
• Databases touch all aspects of our lives
3. Database Applications Examples
• Enterprise Information
• Sales: customers, products, purchases
• Accounting: payments, receipts, assets
• Human Resources: Information about employees, salaries, payroll taxes.
• Manufacturing: management of production, inventory, orders, supply chain.
• Banking and finance
• customer information, accounts, loans, and banking transactions.
• Credit card transactions
• Finance: sales and purchases of financial instruments (e.g., stocks and bonds; storing real-time
market data
• Universities: registration, grades
October 8, 2021 UITG004 3
4. Database Applications Examples (Cont.)
• Airlines: reservations, schedules
• Telecommunication: records of calls, texts, and data usage, generating monthly bills, maintaining balances on
prepaid calling cards
• Web-based services
• Online retailers: order tracking, customized recommendations
• Online advertisements
• Document databases
• Navigation systems: For maintaining the locations of varies places of interest along with the exact routes of
roads, train systems, buses, etc.
October 8, 2021 UITG004 4
5. Purpose of Database Systems
File systems lead to:
• Data redundancy and inconsistency: data is stored in multiple file formats resulting induplication of information in different files
• Difficulty in accessing data
• Need to write a new program to carry out each new task
• Data isolation
• Multiple files and formats
• Integrity problems
• Integrity constraints (e.g., account balance > 0) become “buried” in program code rather than being stated explicitly
• Hard to add new constraints or change existing ones
October 8, 2021 UITG004 5
6. Purpose of Database Systems (Cont.)
• Atomicity of updates
• Failures may leave database in an inconsistent state with partial updates carried out
• Example: Transfer of funds from one account to another should either complete or not happen at all
• Concurrent access by multiple users
• Concurrent access needed for performance
• Uncontrolled concurrent accesses can lead to inconsistencies
• Ex: Two people reading a balance (say 100) and updating it by withdrawing money (say 50 each) at the
same time
• Security problems
• Hard to provide user access to some, but not all, data
Database systems offer solutions to all the above problems
October 8, 2021 UITG004 6
7. Data Models
• A collection of tools for describing
• Data
• Data relationships
• Data semantics
• Data constraints
• Relational model
• Entity-Relationship data model (mainly for database design)
• Object-based data models (Object-oriented and Object-relational)
• Semi-structured data model (XML)
• Other older models:
• Network model
• Hierarchical model
October 8, 2021 UITG004 9
8. Relational Model
• All the data is stored in various tables.
• Example of tabular data in the relational model
Columns
Rows
Ted Codd
Turing Award 1981
October 8, 2021 UITG004 10
10. View of Data
An architecture for a database system
October 8, 2021 UITG004 13
11. Instances and Schemas
• Similar to types and variables in programming languages
• Logical Schema – the overall logical structure of the database
• Example: The database consists of information about a set of customers and accounts in a bank and the relationship between
them
• Analogous to type information of a variable in a program
• Physical schema – the overall physical structure of the database
• Instance – the actual content of the database at a particular point in time
• Analogous to the value of a variable
14
October 8, 2021 UITG004
12. Physical Data Independence
• Physical Data Independence – the ability to modify the physical schema without changing the logical
schema
• Applications depend on the logical schema
• In general, the interfaces between the various levels and components should be well defined so that
changes in some parts do not seriously influence others.
October 8, 2021 UITG004 15
13. Data Definition Language (DDL)
• Specification notation for defining the database schema
• Example: create table instructor (
ID char(5),
name varchar(20),
dept_name varchar(20),
salary numeric(8,2))
• DDL compiler generates a set of table templates stored in a data dictionary
• Data dictionary contains metadata (i.e., data about data)
• Database schema
• Integrity constraints
• Primary key (ID uniquely identifies instructors)
• Authorization
• Who can access what
October 8, 2021 UITG004 16
14. Data Manipulation Language (DML)
• Language for accessing and updating the data organized by the appropriate data model
• DML also known as query language
• There are basically two types of data-manipulation language
• Procedural DML -- require a user to specify what data are needed and how to get those data.
• Declarative DML -- require a user to specify what data are needed without specifying how to get those
data.
• Declarative DMLs are usually easier to learn and use than are procedural DMLs.
• Declarative DMLs are also referred to as non-procedural DMLs
• The portion of a DML that involves information retrieval is called a query language.
October 8, 2021 UITG004 17
15. SQL Query Language
• SQL query language is nonprocedural. A query takes as input several tables (possibly only one) and always
returns a single table.
• Example to find all instructors in Comp. Sci. dept
• select name
from instructor
where dept_name = 'Comp. Sci.'
• SQL is NOT a Turing machine equivalent language
• To be able to compute complex functions SQL is usually embedded in some higher-level language
• Application programs generally access databases through one of
• Language extensions to allow embedded SQL
• Application program interface (e.g., ODBC/JDBC) which allow SQL queries to be sent to a database
October 8, 2021 UITG004 18
16. Database Access from Application Program
• Non-procedural query languages such as SQL are not as powerful as a universal Turing machine.
• SQL does not support actions such as input from users, output to displays, or communication over the
network.
• Such computations and actions must be written in a host language, such as C/C++, Java or Python, with
embedded SQL queries that access the data in the database.
• Application programs -- are programs that are used to interact with the database in this fashion.
October 8, 2021 UITG004 19
17. Database Design
• Logical Design – Deciding on the database schema. Database design requires that we find a “good”
collection of relation schemas.
• Business decision – What attributes should we record in the database?
• Computer Science decision – What relation schemas should we have and how should the attributes
be distributed among the various relation schemas?
• Physical Design – Deciding on the physical layout of the database
October 8, 2021 UITG004 20
18. Database Engine
• A database system is partitioned into modules that deal with each of the responsibilities of the overall system.
• The functional components of a database system can be divided into
• The storage manager,
• The query processor component,
• The transaction management component.
October 8, 2021 UITG004 21
19. Storage Manager
• A program module that provides the interface between the low-level data stored in the database and the
application programs and queries submitted to the system.
• The storage manager is responsible to the following tasks:
• Interaction with the OS file manager
• Efficient storing, retrieving and updating of data
• The storage manager components include:
• Authorization and integrity manager
• Transaction manager
• File manager
• Buffer manager
October 8, 2021 UITG004 22
20. Storage Manager (Cont.)
• The storage manager implements several data structures as part of the physical system implementation:
• Data files -- store the database itself
• Data dictionary -- stores metadata about the structure of the database, in particular the schema of the
database.
• Indices -- can provide fast access to data items. A database index provides pointers to those data items
that hold a particular value.
October 8, 2021 UITG004 23
21. Query Processor
• The query processor components include:
• DDL interpreter -- interprets DDL statements and records the definitions in the data dictionary.
• DML compiler -- translates DML statements in a query language into an evaluation plan consisting of
low-level instructions that the query evaluation engine understands.
• The DML compiler performs query optimization; that is, it picks the lowest cost evaluation plan from
among the various alternatives.
• Query evaluation engine -- executes low-level instructions generated by the DML compiler.
October 8, 2021 UITG004 24
23. Transaction Management
• A transaction is a collection of operations that performs a single logical function in a database application
• Transaction-management component ensures that the database remains in a consistent (correct) state
despite system failures (e.g., power failures and operating system crashes) and transaction failures.
• Concurrency-control manager controls the interaction among the concurrent transactions, to ensure the
consistency of the database.
October 8, 2021 UITG004 26
24. Database Architecture
• Centralized databases
• One to a few cores, shared memory
• Client-server,
• One server machine executes work on behalf of multiple client machines.
• Parallel databases
• Many core shared memory
• Shared disk
• Shared nothing
• Distributed databases
• Geographical distribution
• Schema/data heterogeneity
October 8, 2021 UITG004 27
26. Database Applications
• Two-tier architecture -- the application resides at the client machine, where it invokes database system
functionality at the server machine
• Three-tier architecture -- the client machine acts as a front end and does not contain any direct database
calls.
• The client end communicates with an application server, usually through a forms interface.
• The application server in turn communicates with a database system to access data.
October 8, 2021 UITG004 29
29. Database Administrator
• Schema definition
• Storage structure and access-method definition
• Schema and physical-organization modification
• Granting of authorization for data access
• Routine maintenance
• Periodically backing up the database
• Ensuring that enough free disk space is available for normal operations, and upgrading disk space as
required
• Monitoring jobs running on the database
A person who has central control over the system is called a database administrator (DBA). Functions of a
DBA include:
October 8, 2021 UITG004 32
30. History of Database Systems
• 1950s and early 1960s:
• Data processing using magnetic tapes for storage
• Tapes provided only sequential access
• Punched cards for input
• Late 1960s and 1970s:
• Hard disks allowed direct access to data
• Network and hierarchical data models in widespread use
• Ted Codd defines the relational data model
• Would win the ACM Turing Award for this work
• IBM Research begins System R prototype
• UC Berkeley (Michael Stonebraker) begins Ingres prototype
• Oracle releases first commercial relational database
• High-performance (for the era) transaction processing
October 8, 2021 UITG004 33
31. History of Database Systems (Cont.)
• 1980s:
• Research relational prototypes evolve into commercial systems
• SQL becomes industrial standard
• Parallel and distributed database systems
• Wisconsin, IBM, Teradata
• Object-oriented database systems
• 1990s:
• Large decision support and data-mining applications
• Large multi-terabyte data warehouses
• Emergence of Web commerce
October 8, 2021 UITG004 34
32. History of Database Systems (Cont.)
• 2000s
• Big data storage systems
• Google BigTable, Yahoo PNuts, Amazon,
• “NoSQL” systems.
• Big data analysis: beyond SQL
• Map reduce and friends
• 2010s
• SQL reloaded
• SQL front end to Map Reduce systems
• Massively parallel database systems
• Multi-core main-memory databases
October 8, 2021 UITG004 35
33. References
Abraham Silberschatz, Henry F. Korth & Sudharshan S (2010). Database System Concepts. 6th Edition, Tata McGraw
Hill.
Acknowledgement:
The content in this presentation is adopted from the website https://www.db-book.com/. This presentation is used for instructional purpose and not for any
purpose involving monetary profits.
This presentation adheres to CC BY-SA 4.0, provided any user deriving the contents acknowledge the original authors Abraham Silberschatz, Henry F. Korth &
Sudharshan S
36
October 8, 2021 UITG004