SlideShare a Scribd company logo
Advanced DBMS
(Assignment –I)
Submitted in partial fulfilment of the requirements for the degree of
Master of Technology in Information TechnologyMaster of Technology in Information TechnologyMaster of Technology in Information TechnologyMaster of Technology in Information Technology
by
Vijayananda D Mohire
(Enrolment No.921DMTE0113)
Information Technology Department
Karnataka State Open University
Manasagangotri, Mysore – 570006
Karnataka, India
(2009)
MT-14-I
2
/17/2009
Advanced DBMS
MT-14-I
3
CERTIFICATECERTIFICATECERTIFICATECERTIFICATE
This is to certify that the Assignment-I entitled (Advanced DBMS, subject
code: MT14) submitted by Vijayananda D Mohire having Roll Number
921DMTE0113 for the partial fulfilment of the requirements of Master of
Technology in Information Technology degree of Karnataka State Open
University, Mysore, embodies the bonafide work done by him under my
supervision.
Place: ________________Place: ________________Place: ________________Place: ________________ Signature of the Internal SupervisorSignature of the Internal SupervisorSignature of the Internal SupervisorSignature of the Internal Supervisor
NameNameNameName
Date: ________________Date: ________________Date: ________________Date: ________________ DesignationDesignationDesignationDesignation
MT-14-I
4
For EvaluationFor EvaluationFor EvaluationFor Evaluation
QuestionQuestionQuestionQuestion
NumberNumberNumberNumber
Maximum MarksMaximum MarksMaximum MarksMaximum Marks Marks awardedMarks awardedMarks awardedMarks awarded Comments, if anyComments, if anyComments, if anyComments, if any
1 1
2 1
3 1
4 1
5 1
6 1
7 1
8 1
9 1
10 1
TOTALTOTALTOTALTOTAL 10
Evaluator’s Name and Signature Date
MT-14-I
5
PrefacePrefacePrefacePreface
This document has been prepared specially for the assignments of M.Tech – IT I
Semester. This is mainly intended for evaluation of assignment of the academic M.Tech
- IT, I semester. I have made a sincere attempt to gather and study the best answers to
the assignment questions and have attempted the responses to the questions. I am
confident that the evaluator’s will find this submission informative and evaluate based on
the provide content.
For clarity and ease of use there is a Table of contents and Evaluators section to make
easier navigation and recording of the marks. A list of references has been provided in
the last page – Bibliography that provides the source of information both internal and
external. Evaluator’s are welcome to provide the necessary comments against each
response, suitable space has been provided at the end of each response.
I am grateful to the Infysys academy, Koramangala, Bangalore in making this a big
success. Many thanks for the timely help and attention in making this possible within
specified timeframe. Special thanks to Mr. Vivek and Mr. Prakash for their timely help
and guidance.
Candidate’s Name and Signature Date
MT-14-I
6
Table of ContentsTable of ContentsTable of ContentsTable of Contents
FFFFOROROROR EEEEVALUATIONVALUATIONVALUATIONVALUATION.............................................................................................................................................................. 4
PPPPREFACEREFACEREFACEREFACE............................................................................................................................................................................. 5
QQQQUESTIONUESTIONUESTIONUESTION 1111........................................................................................................................................................................ 9
AAAANSWERNSWERNSWERNSWER 1111........................................................................................................................................................................... 9
QQQQUESTIONUESTIONUESTIONUESTION 2222......................................................................................................................................................................14
AAAANSWERNSWERNSWERNSWER 2222.........................................................................................................................................................................14
QQQQUESTIONUESTIONUESTIONUESTION 3333......................................................................................................................................................................16
AAAANSWERNSWERNSWERNSWER 3333.........................................................................................................................................................................16
QQQQUESTIONUESTIONUESTIONUESTION 4444......................................................................................................................................................................17
AAAANSWNSWNSWNSWERERERER 4444.........................................................................................................................................................................18
QQQQUESTIONUESTIONUESTIONUESTION 5555......................................................................................................................................................................20
AAAANSWERNSWERNSWERNSWER 5555.........................................................................................................................................................................20
QQQQUESTIONUESTIONUESTIONUESTION 6666......................................................................................................................................................................23
AAAANSWNSWNSWNSWERERERER 6666.........................................................................................................................................................................24
AAAANSWERNSWERNSWERNSWER 6666.........................................................................................................................................................................26
QQQQUESTIONUESTIONUESTIONUESTION 7777......................................................................................................................................................................28
AAAANSWERNSWERNSWERNSWER 7777.........................................................................................................................................................................28
QQQQUESTIONUESTIONUESTIONUESTION 8888......................................................................................................................................................................30
AAAANSWNSWNSWNSWERERERER 8888.........................................................................................................................................................................30
QQQQUESTIONUESTIONUESTIONUESTION 9(9(9(9(IIII)))).................................................................................................................................................................34
AAAANSWERNSWERNSWERNSWER 9(9(9(9(IIII)))).....................................................................................................................................................................34
QQQQUESTIONUESTIONUESTIONUESTION 9(9(9(9(IIIIIIII))))................................................................................................................................................................37
AAAANSWERNSWERNSWERNSWER 9(9(9(9(IIIIIIII))))....................................................................................................................................................................37
QQQQUESTIONUESTIONUESTIONUESTION 10101010...................................................................................................................................................................39
AAAANSWERNSWERNSWERNSWER 10101010......................................................................................................................................................................39
BBBBIBLIOGRAPHYIBLIOGRAPHYIBLIOGRAPHYIBLIOGRAPHY.................................................................................................................................................................43
MT-14-I
7
TableTableTableTable of Figuresof Figuresof Figuresof Figures
Figure 1Figure 1Figure 1Figure 1 Structure of DBMS (Goyal, 2008)......................................................................................................................................10
Figure 2Figure 2Figure 2Figure 2 Extended ER Model Constructs (Mylopoulos, 2004)...............................................................................................17
Figure 3Figure 3Figure 3Figure 3 Client - Server Architecture.................................................................................................................................................18
Figure 4Figure 4Figure 4Figure 4 Database Views (Ahmad, 1997).........................................................................................................................................24
Figure 5Figure 5Figure 5Figure 5 Query Parsing...........................................................................................................................................................................31
FiFiFiFigure 6gure 6gure 6gure 6 Query parsing steps...............................................................................................................................................................31
Figure 7Figure 7Figure 7Figure 7 Parsing Tree..............................................................................................................................................................................32
Figure 8Figure 8Figure 8Figure 8 Centralized Architecture.......................................................................................................................................................40
Figure 9Figure 9Figure 9Figure 9 Client –Server Architecture..................................................................................................................................................40
MT-14-I
8
ADVANCEDADVANCEDADVANCEDADVANCED DBMSDBMSDBMSDBMS
RESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENT –––– IIII
MT-14-I
9
Question 1Question 1Question 1Question 1 What are the basics of DBMS?
Answer 1Answer 1Answer 1Answer 1
A Database Management System (DBMS) is a software package designed to
store and manage databases.
DBMS Software that controls the organization, storage, retrieval, security and
integrity of data in a database. It accepts requests from the application and
instructs the operating system to transfer the appropriate data. The major DBMS
vendors are Oracle, IBM, Microsoft and Sybase (see Oracle database, DB2, SQL
Server and ASE). MySQL is a very popular open source product.
STRUCTURE OF DBMSSTRUCTURE OF DBMSSTRUCTURE OF DBMSSTRUCTURE OF DBMS (Goyal, 2008)
DBMS (Database Management System) acts as an interface between the user
and the database. The user requests the DBMS to perform various operations
(insert, delete, update and retrieval) on the database. The components of DBMS
perform these requested operations on the database and provide
necessary data to the users. The various components of DBMS are shown in
Figure 1
MT-14-I
10
1. DDL Compiler1. DDL Compiler1. DDL Compiler1. DDL Compiler - Data Description Language compiler processes schema
definitions specified in the DDL. It includes metadata information such as the
name of the files, data items, storage details of each file, mapping information and
constraints etc.
2. DML Compiler and Query optimizer2. DML Compiler and Query optimizer2. DML Compiler and Query optimizer2. DML Compiler and Query optimizer - The DML commands such as
insert, update, delete, retrieve from the application program are sent to the DML
compiler for compilation into object code for database access. The object code is
then optimized in the best way to execute a query by the query optimizer and then
send to the data manager.
3. Data Manager3. Data Manager3. Data Manager3. Data Manager - The Data Manager is the central software component of
the DBMS also knows as Database Control System.
4. Data Dictionary4. Data Dictionary4. Data Dictionary4. Data Dictionary - Data Dictionary is a repository of description of data in
the database. It contains information about
FigureFigureFigureFigure 1111 Structure of DBMS (Goyal, 2008)
MT-14-I
11
• Data - names of the tables, names of attributes of each table, length of
attributes, and number of rows in each table.
• Relationships between database transactions and data items referenced
by them which is useful in determining which transactions are affected
when certain data definitions are changed.
• Constraints on data i.e. range of values permitted.
• Detailed information on physical database design such as storage
structure, access paths, files and record sizes.
• Access Authorization - is the Description of database users their
responsibilities and their access rights.
• Usage statistics such as frequency of query and transactions.
Data dictionary is used to actually control the data integrity, database
operation and accuracy. It may be used as a important part of the DBMS.
5. Data Files5. Data Files5. Data Files5. Data Files ---- It contains the data portion of the database.
6. Compiled DML6. Compiled DML6. Compiled DML6. Compiled DML ---- The DML complier converts the high level Queries into
low level file access commands known as compiled DML.
7. End Users7. End Users7. End Users7. End Users ---- They are already discussed in previous section.
Major Features of a DBMS
Data SecurityData SecurityData SecurityData Security
The DBMS can prevent unauthorized users from viewing or updating the
database. Using passwords, users are allowed access to the entire database or a
MT-14-I
12
subset of it known as a "subschema." For example, in an employee database,
some users may be able to view salaries while others may view only work history
and medical data.
Data IntegrityData IntegrityData IntegrityData Integrity
The DBMS can ensure that no more than one user can update the same record at
the same time. It can keep duplicate records out of the database; for example, no
two customers with the same customer number can be entered.
Interactive QueryInteractive QueryInteractive QueryInteractive Query
Most DBMSs provide query languages and report writers that let users
interactively interrogate the database and analyze its data. This important feature
gives users access to all management information as needed.
Interactive Data Entry and UpdatingInteractive Data Entry and UpdatingInteractive Data Entry and UpdatingInteractive Data Entry and Updating
Many DBMSs provide a way to interactively enter and edit data, allowing you to
manage your own files and databases. However, interactive operation does not
leave an audit trail and does not provide the controls necessary in a large
organization. These controls must be programmed into the data entry and update
programs of the application.
This is a common misconception about desktop computer DBMSs. Complex
business systems can be developed, but not without programming. This is not the
same as creating lists of data for your own record keeping.
Data IndependenceData IndependenceData IndependenceData Independence
With DBMSs, the details of the data structure are not stated in each application
MT-14-I
13
program. The program asks the DBMS for data by field name; for example, a
coded equivalent of "give me customer name and balance due" would be sent to
the DBMS. Without a DBMS, the programmer must reserve space for the full
structure of the record in the program. Any change in data structure requires
changing all application programs.
Evaluator’s Comments if any:
MT-14-I
14
Question 2Question 2Question 2Question 2 What is information integration?
Answer 2Answer 2Answer 2Answer 2
Information integration is an important feature of Oracle9i database. Oracle
provides many features that allows customers to synchronously and
asynchronously integrate their data including Oracle streams, Oracle Advanced
Queuing, replication and distributed SQL. Oracle also provides gateways to non-
Oracle database servers, providing seamless interoperation in heterogeneous
environment.
Asynchronous integration with Oracle streams:
Oracle streams enables the propagation and management of data, transactions
and events in a data stream within a database, or from one database to another.
The stream routes published information to subscribed destinations. The result is
a new feature that provides greater functionality and flexibility than traditional
solutions for capturing and managing events, and sharing the events with other
databases and applications. Oracle streams provide both message queuing and
replication functionality within the Oracle database. To simplify deployment of
these specialized information integration solutions, Oracle provides customized
APIs and tools for message queuing, replication and data protection solutions.
MT-14-I
15
These include:
• Advanced queuing for message queuing
• Replication with Oracle streams
Asynchronous integration with Oracle Advanced replication
Oracle also includes Advanced Replication. This is a powerful replication feature
first introduced in Oracle 7. Advanced replication is useful for replicating object
between Oracle9i database and older versions of the Oracle server. Advanced
replication also provides Oracle materialized views; a replication solution targeted
for mass deployments and disconnected replicas.
Synchronous Integration with distributed SQL
Oracle distributed SQL enables synchronous access from one Oracle database,
to other Oracle or non-Oracle databases. Distributed SQL supports location
independence, making remote objects appear local, facilitating movement of
objects between databases without application code changes. Distributed SQL
supports both queries and DML operations, and can intelligently optimize
execution plans to access data in the most efficient manner.
Evaluator’s Comments if any:
MT-14-I
16
Question 3Question 3Question 3Question 3 What is the meaning of extended ER models?
Answer 3Answer 3Answer 3Answer 3
• The Extended Entity-Relationship (EER) model is a conceptual (or
semantic) data model, capable of describing the data requirements for a
new information system in a direct and easy to understand graphical
notation.
• Data requirements for a database are described in terms of a conceptual
schema, using the EER model.
• EER schemata are comparable to UML class diagrams.
MT-14-I
17
FigureFigureFigureFigure 2222 Extended ER Model Constructs (Mylopoulos, 2004)
The EER model mainly consists of entity super types, entity subtypes and entity
clustering which are modeled in ER diagram.
Evaluator’s Comments if any:
Question 4Question 4Question 4Question 4 What are client server systems?
MT-14-I
18
Answer 4Answer 4Answer 4Answer 4 ( One response is Similar to answer 10, alternate described below).
Alternate response:
Client/Server technology is the computer architecture used in almost all
automated library systems now being offered to libraries. (KSOU, 2009)
FigureFigureFigureFigure 3333 Client - Server Architecture
This is a computer architecture that divides functions into client and server
subsystems, with standard communication method to facilitate the sharing of
information between them. Among the characteristics of a client/server
architecture following are the key ones:
• The client and server can be distinguished from one another by the
differences in tasks they perform.
MT-14-I
19
• The client and server usually operate on different computer platforms
• Either the client or the server may be upgraded without affecting the
other
• Client may connect to one or more servers; servers may connect to
multiple clients concurrently. Clients always initiate the dialogue by
requesting a service
• Client/server is most easily differentiated from hierarchical processing,
which used a host and slave , by the way a PC functions within a
system. In client/server the PC based client communicates with the
server as a computer; in hierarchical processing the PC emulates a
dumb terminal to communicate with the host. In client/server the client
controls part of the activity, but in hierarchical processing the host
controls all activities. A client PC almost always does the following in a
client/server environment: screen handling, menu or command
interpretation, data entry, help processing, and error recovery.
The dividing line between the client and server can be anywhere along a
broad continuum: at one end only the user interface has been moved onto the
MT-14-I
20
client; at the other, almost all applications have been moved onto the client
and the database may be distributed.
Evaluator’s Comments if any:
Question 5Question 5Question 5Question 5 What is normalization?
Answer 5Answer 5Answer 5Answer 5
In the field of relational database design, normalization (Anonymous, 2009) is a
systematic way of ensuring that a database structure is suitable for general-
purpose querying and free of certain undesirable characteristics—insertion,
update, and deletion anomalies—that could lead to a loss of data integrity. E.F.
Codd, the inventor of the relational model, introduced the concept of
normalization and what we now know as the First Normal Form (1NF) in
1970.Codd went on to define the Second Normal Form (2NF) and Third Normal
Form (3NF) in 1971,and Codd and Raymond F. Boyce defined the Boyce-Codd
Normal Form in 1974.Higher normal forms were defined by other theorists in
MT-14-I
21
subsequent years, the most recent being the Sixth Normal Form (6NF) introduced
by Chris Date, Hugh Darwen, and Nikos Lorentzos in 2002.
Informally, a relational database table (the computerized representation of a
relation) is often described as "normalized" if it is in the Third Normal Form. Most
3NF tables are free of insertion, update, and deletion anomalies, i.e. in most
cases 3NF tables adhere to BCNF, 4NF, and 5NF (but typically not 6NF).
The normal forms (abbrev. NF) of relational database theory provide criteria for
determining a table's degree of vulnerability to logical inconsistencies and
anomalies. The higher the normal form applicable to a table, the less vulnerable it
is to inconsistencies and anomalies. Each table has a "highest normal form"
(HNF): by definition, a table always meets the requirements of its HNF and of all
normal forms lower than its HNF; also by definition, a table fails to meet the
requirements of any normal form higher than its HNF.
The normal forms are applicable to individual tables; to say that an entire
database is in normal form n is to say that all of its tables are in normal form n.
Newcomers to database design sometimes suppose that normalization proceeds
in an iterative fashion, i.e. a 1NF design is first normalized to 2NF, then to 3NF,
and so on. This is not an accurate description of how normalization typically
works. A sensibly designed table is likely to be in 3NF on the first attempt;
furthermore, if it is 3NF, it is overwhelmingly likely to have an HNF of 5NF.
MT-14-I
22
Achieving the "higher" normal forms (above 3NF) does not usually require an
extra expenditure of effort on the part of the designer, because 3NF tables usually
need no modification to meet the requirements of these higher normal forms.
The main normal forms are summarized below.
TableTableTableTable 1111 Normal Forms
Normal formNormal formNormal formNormal form Defined byDefined byDefined byDefined by Brief definitionBrief definitionBrief definitionBrief definition
First normal form
(1NF)
E.F. Codd (1970)
Table faithfully represents a relation and
has no repeating groups
Second normal form
(2NF)
E.F. Codd (1971)
No non-prime attribute in the table is
functionally dependent on a part (proper
subset) of a candidate key
Third normal form
(3NF)
E.F. Codd (1971)
Every non-prime attribute is non-
transitively dependent on every key of
the table
Boyce-Codd normal
form (BCNF)
Raymond F. Boyce
and E.F. Codd (1974)
Every non-trivial functional dependency
in the table is a dependency on a
superkey
MT-14-I
23
Fourth normal form
(4NF)
Ronald Fagin (1977)
Every non-trivial multivalued
dependency in the table is a
dependency on a superkey
Fifth normal form
(5NF)
Ronald Fagin (1979)
Every non-trivial join dependency in the
table is implied by the superkeys of the
table
Domain/key normal
form (DKNF)
Ronald Fagin (1981)
Every constraint on the table is a logical
consequence of the table's domain
constraints and key constraints
Sixth normal form
(6NF)
Chris Date, Hugh
Darwen, and Nikos
Lorentzos (2002)
Table features no non-trivial join
dependencies at all (with reference to
generalized join operator)
Evaluator’s Comments if any:
Question 6Question 6Question 6Question 6 What are views? Explain its various types?
Answer 6Answer 6Answer 6Answer 6 (Ahmad, 1997)
In 1975, the American National Standards Institute (ANSI) Standards Planning
and Requirements Committee (SPARC) developed standard based on a
level approach.
Three level approach with data dictionary:
1. External level or View
2. Conceptual level or View
3. Internal level or View
• The External level is the way users perceive the data
• The Internal level is the way the DBMS and the Operating
perceive the data
• The Conceptual level provides both the mapping and the independence
between the external and the internal levels
FigureFigureFigureFigure 4444 Database Views
24
(Ahmad, 1997)
In 1975, the American National Standards Institute (ANSI) Standards Planning
and Requirements Committee (SPARC) developed standard based on a
Three level approach with data dictionary:
External level or View
Conceptual level or View
Internal level or View
The External level is the way users perceive the data
The Internal level is the way the DBMS and the Operating
perceive the data
The Conceptual level provides both the mapping and the independence
between the external and the internal levels
Database Views (Ahmad, 1997)
MT-14-I
In 1975, the American National Standards Institute (ANSI) Standards Planning
and Requirements Committee (SPARC) developed standard based on a three
The External level is the way users perceive the data
The Internal level is the way the DBMS and the Operating System
The Conceptual level provides both the mapping and the independence
MT-14-I
25
External View :
• The user’s view of the database
• Consists of different external views of the database
1. entities
2. attributes
• Relationships
• Different representation of the same data, e.g. date
Conceptual View:
• Describes what data is stored in the database and their relationships
• Independent of any storage considerations e.g. no. of bytes occupied
by Staff No.
• Consists of the logical structure of the database as seen by the DBA
1. all entities, attributes and their relationships
2. constraints on data
3. meaning of data
4. security and integrity
Internal View:
• The physical representation of the database in the computer
• Describes how data is stored in the data-base to achieve optimal
performance and storage space utilization
MT-14-I
26
1. storage allocation for data and indexes
2. record description for storage
3. record placement
4. data compression & encryption techniques
Answer 6Answer 6Answer 6Answer 6 (Alternate answer)
In database theory, a view consists of a stored query accessible as a virtual table
composed of the result set of a query. Unlike ordinary tables (base tables) in a
relational database, a view does not form part of the physical schema: it is a
dynamic, virtual table computed or collated from data in the database. Changing
the data in a table alters the data shown in subsequent invocations of the view.
Views can provide advantages over tables:
• Views can represent a subset of the data contained in a table
• Views can join and simplify multiple tables into a single virtual table
• Views can act as aggregated tables, where the database engine
aggregates data (sum, average etc) and presents the calculated results
as part of the data
MT-14-I
27
• Views can hide the complexity of data; for example a view could appear
as Sales2000 or Sales2001, transparently partitioning the actual
underlying table
• Views take very little space to store; the database contains only the
definition of a view, not a copy of all the data it presents
• Depending on the SQL engine used, views can provide extra security
• Views can limit the degree of exposure of a table or tables to the outer
world
Just as functions (in programming) can provide abstraction, so database users
can create abstraction by using views. In another parallel with functions, database
users can manipulate nested views, thus one view can aggregate data from other
views. Without the use of views the normalization of databases above second
normal form would become much more difficult. Views can make it easier to
create lossless join decomposition.
Just as rows in a base table lack any defined ordering, rows available through a
view do not appear with any default sorting. A view is a relational table, and the
relational model defines a table as a set of rows. Since sets are not ordered - by
definition - the rows in a view are not ordered, either. Therefore, an ORDER BY
clause in the view definition is meaningless. The SQL standard (SQL:2003) does
not allow an ORDER BY clause in a subselect in a CREATE VIEW statement, just
as it is not allowed in a CREATE TABLE statement. However, sorted data can be
MT-14-I
28
obtained from a view, in the same way as any other table - as part of a query
statement. In Oracle 10g, a view can be created with an ORDER BY clause in a
subquery.
Evaluator’s Comments if any:
Question 7Question 7Question 7Question 7 What is Dynamic SQL?
Answer 7Answer 7Answer 7Answer 7
Dynamic SQL is a programming technique that enables you to build SQL
statements dynamically at runtime. You can create more general purpose, flexible
applications by using dynamic SQL because the full text of a SQL statement may
be unknown at compilation. For example, dynamic SQL lets you create a
procedure that operates on a table whose name is not known until runtime.
Oracle includes two ways to implement dynamic SQL in a PL/SQL application:
• Native dynamic SQL, where you place dynamic SQL statements directly
into PL/SQL blocks.
• Calling procedures in the DBMS_SQL package.
MT-14-I
29
You should use dynamic SQL only if you cannot use static SQL to accomplish
your goals, or if using static SQL is cumbersome compared to dynamic SQL.
However, static SQL has limitations that can be overcome with dynamic SQL.
You can use dynamic SQL to create applications that execute dynamic queries,
whose full text is not known until runtime. Many types of applications need to use
dynamic queries, including:
• Applications that allow users to input or choose query search or sorting
criteria at runtime
• Applications that allow users to input or choose optimizer hints at run time
• Applications that query a database where the data definitions of tables are
constantly changing
• Applications that query a database where new tables are created often
Language features:
• If you use C/C++, you can call dynamic SQL with the Oracle Call Interface
(OCI), or you can use the Pro*C/C++ precompiler to add dynamic SQL
extensions to your C code.
• If you use COBOL, you can use the Pro*COBOL precompiler to add
dynamic SQL extensions to your COBOL code.
• If you use Java, you can develop applications that use dynamic SQL with
MT-14-I
30
JDBC.
Factors to be considered while designing Dynamic SQL. Careful analysis of the
below and their affects on the performance needs to be addressed.
1. Permissions
2. Query execution plans
3. Network traffic
4. Using Output parameters
5. How logic is encapsulated
Evaluator’s Comments if any:
Question 8Question 8Question 8Question 8 What is parsing?
Answer 8Answer 8Answer 8Answer 8
Parsing is a subset activity of Database Query Compiler and does the following
• Parses SQL query into parse treeparse treeparse treeparse tree
• Transforms parse tree into expression tree (logical query plan)expression tree (logical query plan)expression tree (logical query plan)expression tree (logical query plan)
MT-14-I
31
• Transforms logical query plan into physical query planphysical query planphysical query planphysical query plan
Above sequence is pictorially depicted in Figure
FigureFigureFigureFigure 5555 Query Parsing
FigureFigureFigureFigure 6666 Query parsing steps
MT-14-I
32
FigureFigureFigureFigure 7777 Parsing Tree
In Oracle, every statement , be it a DDL, DML, or anything else, gets parsed.
Parsing basically means what Oracle understands about the statement and based
on that, how it decides to execute it. This process is also known as Optimization
of the query. As the name says, the idea is how best Oracle can process the
query or in other words, optimize its execution.
Parsing is of two types, Hard parse and Soft parse. If the said query is found in
Oracle's cache, the query optimization is not needed. Oracle can pick up the
optimized query and can execute it. If the query is run for the first time or the
query's cached version is obsolete or flushed out from oracle's cache, query
needs to be optimized and the process is called Hard parse of the query. Hard
parse , in general , is unavoidable as for the very first time, each query needs to
MT-14-I
33
be parsed , at least for once. But in the subsequent executions, query should be
simply soft parsed and executed.
The mechanism which works in the backend for doing all this is called Optimizer.
There are two versions of it, Rule Based and Cost Based. The Rule Based
optimizer(RBO) is made deprecated from Oracle version release 10g. This was
not very much efficient as it was "statement driven". The Cost Based is now the
only and supported mode of optimizer which is, as the name suggests, cost
based and takes into the account the resource consumption of the query.
Evaluator’s Comments if any:
MT-14-I
34
Question 9Question 9Question 9Question 9(i)(i)(i)(i) Write a short note on –
Concurrency control by time stamps
Answer 9Answer 9Answer 9Answer 9(i)(i)(i)(i)
Timestamps are processed so that their execution is equivalent to a serial
execution in their timestamp order. The timestamp-based concurrency control
allows a transaction to read or write a data item x only if x had been last written by
an older transaction. Otherwise, it rejects the operation and restarts the
transaction.
Scheduler tasks:
• Scheduler assign each transaction T a unique number, it’s timestamp
TS(T).
• The timestamp ordering protocol ensures that any conflicting read and
write operations are executed in timestamp order.
• Each transaction is issued a timestamp when it enters the system. If an old
transaction T1 has timestamp TS(T1), a new transaction T2 is assigned
time-stamp TS(T2) such that TS(T1) <TS(T2)
Two approaches to generate TimestampsTwo approaches to generate TimestampsTwo approaches to generate TimestampsTwo approaches to generate Timestamps::::
1. Use the value of system, clock as the timestamp; that is, a
MT-14-I
35
transaction’s timestamp is equal to the value of the clock when the
transaction enters the system.
2. Use a logical counter that is incremented after a new timestamp has
been assigned; that is, a transaction’s is equal to the value of the
counter when the transaction enters the system.
The Rules of Timestamp-Based Scheduling, below example depicts the
rules
Four Classes
• the scheduler receives a request RT(X)
• the scheduler receives a request WT(X)
• the scheduler receives a request to commit T
• the scheduler receives a request to abort T or decides to rollback T
Scheduler receives a request RT(X)
(a) If TS(T)>=WT(X), the read is physically realizable.
i. If C(X) is true, grant the request.
ii. If C(X) is false, delay T until C(X) becomes true or the transaction
that wrote X aborts.
(b) If TS(T)<WT(X), the read is physically unrealizable, abort T and restart
it with a new, larger timestamp.
MT-14-I
36
Scheduler receives a request WT(X)
(a) If TS(T)>=RT(X) and TS(T)>=WT(X), the write is physically realizable
and must be performed.
i. Write the new value for X
ii.Set WT(X):=TS(T), and
iii. Set C(X):= false.
(b) If TS(T)>=RT(X), but TS(T)<WT(X), then the write is physically
realizable, but there is already a later value in X.
i. If C(X) is true, then the previous writers of X is committed, and
ignore the write by T.
ii. If C(X) is false, we must delay T.
(c) If TS(T)<=RT(X), the write is physically unrealizable, and T must be
rolled back.
The scheduler receives a request to commit T.
It must find all the database elements X written
by T, and set C(X):= true.
The scheduler receives a request to abort T or decides to rollback T.
Any transaction that was waiting on an element X that T wrote must
repeat its attempt to read or write, and see whether the action is now legal
MT-14-I
37
after the aborted transaction’s writes are cancelled.
Evaluator’s Comments if any:
Question 9(ii)Question 9(ii)Question 9(ii)Question 9(ii) Write a short note on –
Concurrency control by validation
Answer 9(ii)Answer 9(ii)Answer 9(ii)Answer 9(ii)
• Another type of optimistic concurrency control
• Maintains a record of what active transactions are doing
• Just before a transaction starts to write, it goes through a “validation
phase”
• If a there is a risk of physically unrealizable behavior, the transaction is
rolled back
Scheduler tasks:
MT-14-I
38
• Keep track of each transaction T’s
– Read set RS(T): the set of elements T read
– Write set WS(T): the set of elements T write
• Execute transactions in three phases:
– Read. T reads all the elements in RS(T)
– Validate. Validate T by comparing its RS(T) an WS(T) with those in
other transactions. If the validation fails, T is rolled back
– Write. T writes its values for the elements in WS(T)
Steps:
• START: the set of transactions that have started, but not yet completed
validation. For each T, maintain (T, START(T))
• VAL: the set of transactions that have been validated, but not yet finished.
For each T, maintain (T, START(T), VAL(T))
• FIN: the set of transaction that have completed. For each T, maintain (T,
START(T), VAL(T), FIN(T))
Evaluator’s Comments if any:
MT-14-I
39
Question 10Question 10Question 10Question 10 What is centralized and client server architectures?
Answer 10Answer 10Answer 10Answer 10
Centralized Systems:Centralized Systems:Centralized Systems:Centralized Systems:
• Run on a single computer system and do not interact with other computer
systems.
• Combines everything into single system including- DBMS software,
hardware, application programs, and user interface processing software.
• User can still connect through a remote terminal –however, all processing
is done at centralized site.
• General-purpose computer system: one to a few CPUs and a number of
device controllers that are connected through a common bus that provides
access to shared memory.
• Single-user system (e.g., personal computer or workstation): desk-top unit,
single user, usually has only one CPU and one or two hard disks; the OS
may support only one user.
Multi-user system: more disks, more memory, multiple CPUs, and a multi-user
OS. Serve a large number of users who are connected to the system vie
terminals. Often called server systems.
MT-14-I
40
FigureFigureFigureFigure 8888 Centralized Architecture
ClientClientClientClient----Server Systems:Server Systems:Server Systems:Server Systems:
• Server systems satisfy requests generated at m client systems, whose
general structure is shown below:
FigureFigureFigureFigure 9999 Client –Server Architecture
Specialized Servers with Specialized functions
• Print server
MT-14-I
41
• File server
• DBMS server
• Web server
• Email server
Clients can access the specialized servers as needed
Clients features:
• Provide appropriate interfaces through a client software module to access
and utilize the various server resources.
• Clients may be diskless machines or PCs or Workstations with disks with
only the client software installed.
• Connected to the servers via some form of a network.
Server features;
• Provides database query and transaction services to the clients
• Relational DBMS servers are often called SQL servers, query servers, or
transaction servers
• Applications running on clients utilize an Application Program Interface
(API) to access server databases via standard interface such as:
o ODBC: Open Database Connectivity standard
o JDBC: for Java programming access
MT-14-I
42
• Client and server must install appropriate client module and server module
software for ODBC or JDBC
Evaluator’s Comments if any:
MT-14-I
43
BibliographyBibliographyBibliographyBibliography
Ahmad, E. M. (1997). CMPB244: Database Design. Pahang, Malaysia: Universiti Tenaga Nasional.
Anonymous. (2009). Database normalization. Retrieved 2009, from Wikipedia:
http://en.wikipedia.org/wiki/Database_normalization
Goyal, A. (2008, Feb). STRUCTURE OF DBMS. Retrieved Oct 2009, from DBMSBASICS:
http://dbmsbasics.blogspot.com/2008/02/structure-of-dbms.html
KSOU. (2009). Advanced DBMS. Delhi: Virtual Education Trust.
Mylopoulos, J. (2004). Conceptual Modeling. Toronto, Canada: Department of Computer Science, University of
Toronto .

More Related Content

What's hot

Distributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data ControlDistributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data Control
Gyanmanjari Institute Of Technology
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
MNM Jain Engineering College
 
Dbms case studies_cse_iv_sem
Dbms case studies_cse_iv_semDbms case studies_cse_iv_sem
Dbms case studies_cse_iv_sem
nidhi12gehu
 
Octave
OctaveOctave
Octave
Amar Myana
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
Muhammad Haroon
 
Multimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesMultimedia system, Architecture & Databases
Multimedia system, Architecture & Databases
Harshita Ved
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
Md. Mashiur Rahman
 
Static dynamic and active web pages
Static dynamic and active web pagesStatic dynamic and active web pages
Static dynamic and active web pages
Mohammad Kamrul Hasan
 
Evaluation in Information Retrieval
Evaluation in Information RetrievalEvaluation in Information Retrieval
Evaluation in Information RetrievalDishant Ailawadi
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
dhawal mehta
 
DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
Gyanmanjari Institute Of Technology
 
The database applications
The database applicationsThe database applications
The database applications
Dolat Ram
 
Transaction management DBMS
Transaction  management DBMSTransaction  management DBMS
Transaction management DBMS
Megha Patel
 
12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMSkoolkampus
 
Distributed Query Processing
Distributed Query ProcessingDistributed Query Processing
Distributed Query Processing
Mythili Kannan
 
Information retrieval-systems notes
Information retrieval-systems notesInformation retrieval-systems notes
Information retrieval-systems notes
BAIRAVI T
 
CS6007 information retrieval - 5 units notes
CS6007   information retrieval - 5 units notesCS6007   information retrieval - 5 units notes
CS6007 information retrieval - 5 units notes
Anandh Arumugakan
 

What's hot (20)

web mining
web miningweb mining
web mining
 
Distributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data ControlDistributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data Control
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
Lec1,2
Lec1,2Lec1,2
Lec1,2
 
Dbms case studies_cse_iv_sem
Dbms case studies_cse_iv_semDbms case studies_cse_iv_sem
Dbms case studies_cse_iv_sem
 
Octave
OctaveOctave
Octave
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Multimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesMultimedia system, Architecture & Databases
Multimedia system, Architecture & Databases
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
 
Static dynamic and active web pages
Static dynamic and active web pagesStatic dynamic and active web pages
Static dynamic and active web pages
 
Evaluation in Information Retrieval
Evaluation in Information RetrievalEvaluation in Information Retrieval
Evaluation in Information Retrieval
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
 
The database applications
The database applicationsThe database applications
The database applications
 
Transaction management DBMS
Transaction  management DBMSTransaction  management DBMS
Transaction management DBMS
 
12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS
 
Distributed Query Processing
Distributed Query ProcessingDistributed Query Processing
Distributed Query Processing
 
Information retrieval-systems notes
Information retrieval-systems notesInformation retrieval-systems notes
Information retrieval-systems notes
 
CS6007 information retrieval - 5 units notes
CS6007   information retrieval - 5 units notesCS6007   information retrieval - 5 units notes
CS6007 information retrieval - 5 units notes
 

Viewers also liked

Adbms
AdbmsAdbms
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
Supriya Radhakrishna
 
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
Vikas Jagtap
 
Assignment on dbms
Assignment on dbmsAssignment on dbms
Assignment on dbmsMohd Arif
 
EEE 3rd year oops cat 3 ans
EEE 3rd year  oops cat 3  ansEEE 3rd year  oops cat 3  ans
EEE 3rd year oops cat 3 ans
Karthik Venkatachalam
 
Trees
TreesTrees
Programming Fundamentals With OOPs Concepts (Java Examples Based)
Programming Fundamentals With OOPs Concepts (Java Examples Based)Programming Fundamentals With OOPs Concepts (Java Examples Based)
Programming Fundamentals With OOPs Concepts (Java Examples Based)
indiangarg
 
EEE oops Vth semester viva questions with answer
EEE oops Vth semester viva questions with answerEEE oops Vth semester viva questions with answer
EEE oops Vth semester viva questions with answer
Jeba Moses
 
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
Supriya Radhakrishna
 
Viva questions
Viva questions Viva questions
inline function
inline function inline function
inline function
imran khan
 
Software Engineering tools
Software Engineering tools Software Engineering tools
Software Engineering tools
imran khan
 
05211201 Advanced Data Structures And Algorithms
05211201 Advanced Data Structures  And  Algorithms05211201 Advanced Data Structures  And  Algorithms
05211201 Advanced Data Structures And Algorithms
guestac67362
 
OOPS IN C++
OOPS IN C++OOPS IN C++
OOPS IN C++
Amritsinghmehra
 
Datastructure notes
Datastructure notesDatastructure notes
Datastructure notesSrikanth
 
C++ OOPS Concept
C++ OOPS ConceptC++ OOPS Concept
C++ OOPS Concept
Boopathi K
 
Ad java prac sol set
Ad java prac sol setAd java prac sol set
Ad java prac sol set
Iram Ramrajkar
 

Viewers also liked (20)

Adbms
AdbmsAdbms
Adbms
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
 
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
 
Assignment on dbms
Assignment on dbmsAssignment on dbms
Assignment on dbms
 
EEE 3rd year oops cat 3 ans
EEE 3rd year  oops cat 3  ansEEE 3rd year  oops cat 3  ans
EEE 3rd year oops cat 3 ans
 
Trees
TreesTrees
Trees
 
Programming Fundamentals With OOPs Concepts (Java Examples Based)
Programming Fundamentals With OOPs Concepts (Java Examples Based)Programming Fundamentals With OOPs Concepts (Java Examples Based)
Programming Fundamentals With OOPs Concepts (Java Examples Based)
 
EEE oops Vth semester viva questions with answer
EEE oops Vth semester viva questions with answerEEE oops Vth semester viva questions with answer
EEE oops Vth semester viva questions with answer
 
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
 
Viva questions
Viva questions Viva questions
Viva questions
 
inline function
inline function inline function
inline function
 
Software Engineering tools
Software Engineering tools Software Engineering tools
Software Engineering tools
 
6th Semester CS / IS (2013-June) Question Papers
6th Semester CS / IS (2013-June) Question Papers6th Semester CS / IS (2013-June) Question Papers
6th Semester CS / IS (2013-June) Question Papers
 
05211201 Advanced Data Structures And Algorithms
05211201 Advanced Data Structures  And  Algorithms05211201 Advanced Data Structures  And  Algorithms
05211201 Advanced Data Structures And Algorithms
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 a
 
OOPS IN C++
OOPS IN C++OOPS IN C++
OOPS IN C++
 
Dacj 1-1 b
Dacj 1-1 bDacj 1-1 b
Dacj 1-1 b
 
Datastructure notes
Datastructure notesDatastructure notes
Datastructure notes
 
C++ OOPS Concept
C++ OOPS ConceptC++ OOPS Concept
C++ OOPS Concept
 
Ad java prac sol set
Ad java prac sol setAd java prac sol set
Ad java prac sol set
 

Similar to M.Tech : Advanced DBMS Assignment I

M.Tech : Interactive Computer Graphics Assignment I
M.Tech : Interactive Computer Graphics Assignment I M.Tech : Interactive Computer Graphics Assignment I
M.Tech : Interactive Computer Graphics Assignment I
Vijayananda Mohire
 
MTech - OOSE_Assignment
MTech - OOSE_AssignmentMTech - OOSE_Assignment
MTech - OOSE_Assignment
Vijayananda Mohire
 
MTech - AI_NeuralNetworks_Assignment
MTech - AI_NeuralNetworks_AssignmentMTech - AI_NeuralNetworks_Assignment
MTech - AI_NeuralNetworks_Assignment
Vijayananda Mohire
 
M.Tech : Interactive Computer Graphics Assignment II
M.Tech : Interactive Computer Graphics Assignment IIM.Tech : Interactive Computer Graphics Assignment II
M.Tech : Interactive Computer Graphics Assignment II
Vijayananda Mohire
 
MTech - Algorithm analysis and design assignment
MTech - Algorithm analysis and design assignment MTech - Algorithm analysis and design assignment
MTech - Algorithm analysis and design assignment
Vijayananda Mohire
 
Final Year Project
Final Year ProjectFinal Year Project
Final Year Project
Mahesh Kodituwakku
 
SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512Najeem M Illyas
 
MTech - NETWORK PROGRAMMING_Assignment
MTech - NETWORK PROGRAMMING_AssignmentMTech - NETWORK PROGRAMMING_Assignment
MTech - NETWORK PROGRAMMING_Assignment
Vijayananda Mohire
 
MTech - Advanced_DBMS_Assignment
MTech - Advanced_DBMS_AssignmentMTech - Advanced_DBMS_Assignment
MTech - Advanced_DBMS_Assignment
Vijayananda Mohire
 
Sample Only - SG-Slide Deck-Tech Aided Assessment - Version 2.0.pptx
Sample Only - SG-Slide Deck-Tech Aided Assessment - Version 2.0.pptxSample Only - SG-Slide Deck-Tech Aided Assessment - Version 2.0.pptx
Sample Only - SG-Slide Deck-Tech Aided Assessment - Version 2.0.pptx
NinoIgnacio2
 
3 job adda doc 1
3 job adda doc 13 job adda doc 1
3 job adda doc 1
SURAJ KUMAR YADAVA
 
Kaahwa armstrong intern report
Kaahwa armstrong intern reportKaahwa armstrong intern report
Kaahwa armstrong intern report
kaahwa Armstrong
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship report
kaahwa Armstrong
 
Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Online resort reservation system report (practicum)
Online resort reservation system report (practicum)
Sumaiya Ismail
 
Sport.net(2).doc
Sport.net(2).docSport.net(2).doc
Sport.net(2).doc
KrishnaVerma111737
 
Final Internship Report
Final Internship ReportFinal Internship Report
Final Internship Report
Minhas Kamal
 
Internship report on MyGP of Grameenphone LTD.
Internship report on MyGP of Grameenphone LTD.Internship report on MyGP of Grameenphone LTD.
Internship report on MyGP of Grameenphone LTD.
Insan Haque
 

Similar to M.Tech : Advanced DBMS Assignment I (20)

M.Tech : Interactive Computer Graphics Assignment I
M.Tech : Interactive Computer Graphics Assignment I M.Tech : Interactive Computer Graphics Assignment I
M.Tech : Interactive Computer Graphics Assignment I
 
MTech - OOSE_Assignment
MTech - OOSE_AssignmentMTech - OOSE_Assignment
MTech - OOSE_Assignment
 
MTech - AI_NeuralNetworks_Assignment
MTech - AI_NeuralNetworks_AssignmentMTech - AI_NeuralNetworks_Assignment
MTech - AI_NeuralNetworks_Assignment
 
M.Tech : Interactive Computer Graphics Assignment II
M.Tech : Interactive Computer Graphics Assignment IIM.Tech : Interactive Computer Graphics Assignment II
M.Tech : Interactive Computer Graphics Assignment II
 
MTech - Algorithm analysis and design assignment
MTech - Algorithm analysis and design assignment MTech - Algorithm analysis and design assignment
MTech - Algorithm analysis and design assignment
 
Final Year Project
Final Year ProjectFinal Year Project
Final Year Project
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512
 
MTech - NETWORK PROGRAMMING_Assignment
MTech - NETWORK PROGRAMMING_AssignmentMTech - NETWORK PROGRAMMING_Assignment
MTech - NETWORK PROGRAMMING_Assignment
 
MTech - Advanced_DBMS_Assignment
MTech - Advanced_DBMS_AssignmentMTech - Advanced_DBMS_Assignment
MTech - Advanced_DBMS_Assignment
 
Assignment 6
Assignment 6Assignment 6
Assignment 6
 
bluetooth
bluetoothbluetooth
bluetooth
 
Sample Only - SG-Slide Deck-Tech Aided Assessment - Version 2.0.pptx
Sample Only - SG-Slide Deck-Tech Aided Assessment - Version 2.0.pptxSample Only - SG-Slide Deck-Tech Aided Assessment - Version 2.0.pptx
Sample Only - SG-Slide Deck-Tech Aided Assessment - Version 2.0.pptx
 
3 job adda doc 1
3 job adda doc 13 job adda doc 1
3 job adda doc 1
 
Kaahwa armstrong intern report
Kaahwa armstrong intern reportKaahwa armstrong intern report
Kaahwa armstrong intern report
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship report
 
Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Online resort reservation system report (practicum)
Online resort reservation system report (practicum)
 
Sport.net(2).doc
Sport.net(2).docSport.net(2).doc
Sport.net(2).doc
 
Final Internship Report
Final Internship ReportFinal Internship Report
Final Internship Report
 
Internship report on MyGP of Grameenphone LTD.
Internship report on MyGP of Grameenphone LTD.Internship report on MyGP of Grameenphone LTD.
Internship report on MyGP of Grameenphone LTD.
 

More from Vijayananda Mohire

Quantum Algorithms for Electronics - IEEE Certificate
Quantum Algorithms for Electronics - IEEE CertificateQuantum Algorithms for Electronics - IEEE Certificate
Quantum Algorithms for Electronics - IEEE Certificate
Vijayananda Mohire
 
NexGen Solutions for cloud platforms, powered by GenQAI
NexGen Solutions for cloud platforms, powered by GenQAINexGen Solutions for cloud platforms, powered by GenQAI
NexGen Solutions for cloud platforms, powered by GenQAI
Vijayananda Mohire
 
Certificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on MLCertificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on ML
Vijayananda Mohire
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
Vijayananda Mohire
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
Vijayananda Mohire
 
Bhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAIBhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAI
Vijayananda Mohire
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
Vijayananda Mohire
 
Azure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuitsAzure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuits
Vijayananda Mohire
 
Key projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AIKey projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AI
Vijayananda Mohire
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial Intelligence
Vijayananda Mohire
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
Vijayananda Mohire
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
Vijayananda Mohire
 
Bhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud OfferingsBhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud Offerings
Vijayananda Mohire
 
GitHub Copilot-vijaymohire
GitHub Copilot-vijaymohireGitHub Copilot-vijaymohire
GitHub Copilot-vijaymohire
Vijayananda Mohire
 
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical ImplicationsPractical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Vijayananda Mohire
 
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Vijayananda Mohire
 
Red Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise LinuxRed Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise Linux
Vijayananda Mohire
 
RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024
Vijayananda Mohire
 
Generative AI Business Transformation
Generative AI Business TransformationGenerative AI Business Transformation
Generative AI Business Transformation
Vijayananda Mohire
 
Microsoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohireMicrosoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohire
Vijayananda Mohire
 

More from Vijayananda Mohire (20)

Quantum Algorithms for Electronics - IEEE Certificate
Quantum Algorithms for Electronics - IEEE CertificateQuantum Algorithms for Electronics - IEEE Certificate
Quantum Algorithms for Electronics - IEEE Certificate
 
NexGen Solutions for cloud platforms, powered by GenQAI
NexGen Solutions for cloud platforms, powered by GenQAINexGen Solutions for cloud platforms, powered by GenQAI
NexGen Solutions for cloud platforms, powered by GenQAI
 
Certificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on MLCertificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on ML
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
 
Bhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAIBhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAI
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
Azure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuitsAzure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuits
 
Key projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AIKey projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AI
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial Intelligence
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
 
Bhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud OfferingsBhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud Offerings
 
GitHub Copilot-vijaymohire
GitHub Copilot-vijaymohireGitHub Copilot-vijaymohire
GitHub Copilot-vijaymohire
 
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical ImplicationsPractical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
 
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
 
Red Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise LinuxRed Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise Linux
 
RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024
 
Generative AI Business Transformation
Generative AI Business TransformationGenerative AI Business Transformation
Generative AI Business Transformation
 
Microsoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohireMicrosoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohire
 

Recently uploaded

Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 

Recently uploaded (20)

Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 

M.Tech : Advanced DBMS Assignment I

  • 1. Advanced DBMS (Assignment –I) Submitted in partial fulfilment of the requirements for the degree of Master of Technology in Information TechnologyMaster of Technology in Information TechnologyMaster of Technology in Information TechnologyMaster of Technology in Information Technology by Vijayananda D Mohire (Enrolment No.921DMTE0113) Information Technology Department Karnataka State Open University Manasagangotri, Mysore – 570006 Karnataka, India (2009)
  • 3. MT-14-I 3 CERTIFICATECERTIFICATECERTIFICATECERTIFICATE This is to certify that the Assignment-I entitled (Advanced DBMS, subject code: MT14) submitted by Vijayananda D Mohire having Roll Number 921DMTE0113 for the partial fulfilment of the requirements of Master of Technology in Information Technology degree of Karnataka State Open University, Mysore, embodies the bonafide work done by him under my supervision. Place: ________________Place: ________________Place: ________________Place: ________________ Signature of the Internal SupervisorSignature of the Internal SupervisorSignature of the Internal SupervisorSignature of the Internal Supervisor NameNameNameName Date: ________________Date: ________________Date: ________________Date: ________________ DesignationDesignationDesignationDesignation
  • 4. MT-14-I 4 For EvaluationFor EvaluationFor EvaluationFor Evaluation QuestionQuestionQuestionQuestion NumberNumberNumberNumber Maximum MarksMaximum MarksMaximum MarksMaximum Marks Marks awardedMarks awardedMarks awardedMarks awarded Comments, if anyComments, if anyComments, if anyComments, if any 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9 1 10 1 TOTALTOTALTOTALTOTAL 10 Evaluator’s Name and Signature Date
  • 5. MT-14-I 5 PrefacePrefacePrefacePreface This document has been prepared specially for the assignments of M.Tech – IT I Semester. This is mainly intended for evaluation of assignment of the academic M.Tech - IT, I semester. I have made a sincere attempt to gather and study the best answers to the assignment questions and have attempted the responses to the questions. I am confident that the evaluator’s will find this submission informative and evaluate based on the provide content. For clarity and ease of use there is a Table of contents and Evaluators section to make easier navigation and recording of the marks. A list of references has been provided in the last page – Bibliography that provides the source of information both internal and external. Evaluator’s are welcome to provide the necessary comments against each response, suitable space has been provided at the end of each response. I am grateful to the Infysys academy, Koramangala, Bangalore in making this a big success. Many thanks for the timely help and attention in making this possible within specified timeframe. Special thanks to Mr. Vivek and Mr. Prakash for their timely help and guidance. Candidate’s Name and Signature Date
  • 6. MT-14-I 6 Table of ContentsTable of ContentsTable of ContentsTable of Contents FFFFOROROROR EEEEVALUATIONVALUATIONVALUATIONVALUATION.............................................................................................................................................................. 4 PPPPREFACEREFACEREFACEREFACE............................................................................................................................................................................. 5 QQQQUESTIONUESTIONUESTIONUESTION 1111........................................................................................................................................................................ 9 AAAANSWERNSWERNSWERNSWER 1111........................................................................................................................................................................... 9 QQQQUESTIONUESTIONUESTIONUESTION 2222......................................................................................................................................................................14 AAAANSWERNSWERNSWERNSWER 2222.........................................................................................................................................................................14 QQQQUESTIONUESTIONUESTIONUESTION 3333......................................................................................................................................................................16 AAAANSWERNSWERNSWERNSWER 3333.........................................................................................................................................................................16 QQQQUESTIONUESTIONUESTIONUESTION 4444......................................................................................................................................................................17 AAAANSWNSWNSWNSWERERERER 4444.........................................................................................................................................................................18 QQQQUESTIONUESTIONUESTIONUESTION 5555......................................................................................................................................................................20 AAAANSWERNSWERNSWERNSWER 5555.........................................................................................................................................................................20 QQQQUESTIONUESTIONUESTIONUESTION 6666......................................................................................................................................................................23 AAAANSWNSWNSWNSWERERERER 6666.........................................................................................................................................................................24 AAAANSWERNSWERNSWERNSWER 6666.........................................................................................................................................................................26 QQQQUESTIONUESTIONUESTIONUESTION 7777......................................................................................................................................................................28 AAAANSWERNSWERNSWERNSWER 7777.........................................................................................................................................................................28 QQQQUESTIONUESTIONUESTIONUESTION 8888......................................................................................................................................................................30 AAAANSWNSWNSWNSWERERERER 8888.........................................................................................................................................................................30 QQQQUESTIONUESTIONUESTIONUESTION 9(9(9(9(IIII)))).................................................................................................................................................................34 AAAANSWERNSWERNSWERNSWER 9(9(9(9(IIII)))).....................................................................................................................................................................34 QQQQUESTIONUESTIONUESTIONUESTION 9(9(9(9(IIIIIIII))))................................................................................................................................................................37 AAAANSWERNSWERNSWERNSWER 9(9(9(9(IIIIIIII))))....................................................................................................................................................................37 QQQQUESTIONUESTIONUESTIONUESTION 10101010...................................................................................................................................................................39 AAAANSWERNSWERNSWERNSWER 10101010......................................................................................................................................................................39 BBBBIBLIOGRAPHYIBLIOGRAPHYIBLIOGRAPHYIBLIOGRAPHY.................................................................................................................................................................43
  • 7. MT-14-I 7 TableTableTableTable of Figuresof Figuresof Figuresof Figures Figure 1Figure 1Figure 1Figure 1 Structure of DBMS (Goyal, 2008)......................................................................................................................................10 Figure 2Figure 2Figure 2Figure 2 Extended ER Model Constructs (Mylopoulos, 2004)...............................................................................................17 Figure 3Figure 3Figure 3Figure 3 Client - Server Architecture.................................................................................................................................................18 Figure 4Figure 4Figure 4Figure 4 Database Views (Ahmad, 1997).........................................................................................................................................24 Figure 5Figure 5Figure 5Figure 5 Query Parsing...........................................................................................................................................................................31 FiFiFiFigure 6gure 6gure 6gure 6 Query parsing steps...............................................................................................................................................................31 Figure 7Figure 7Figure 7Figure 7 Parsing Tree..............................................................................................................................................................................32 Figure 8Figure 8Figure 8Figure 8 Centralized Architecture.......................................................................................................................................................40 Figure 9Figure 9Figure 9Figure 9 Client –Server Architecture..................................................................................................................................................40
  • 8. MT-14-I 8 ADVANCEDADVANCEDADVANCEDADVANCED DBMSDBMSDBMSDBMS RESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENT –––– IIII
  • 9. MT-14-I 9 Question 1Question 1Question 1Question 1 What are the basics of DBMS? Answer 1Answer 1Answer 1Answer 1 A Database Management System (DBMS) is a software package designed to store and manage databases. DBMS Software that controls the organization, storage, retrieval, security and integrity of data in a database. It accepts requests from the application and instructs the operating system to transfer the appropriate data. The major DBMS vendors are Oracle, IBM, Microsoft and Sybase (see Oracle database, DB2, SQL Server and ASE). MySQL is a very popular open source product. STRUCTURE OF DBMSSTRUCTURE OF DBMSSTRUCTURE OF DBMSSTRUCTURE OF DBMS (Goyal, 2008) DBMS (Database Management System) acts as an interface between the user and the database. The user requests the DBMS to perform various operations (insert, delete, update and retrieval) on the database. The components of DBMS perform these requested operations on the database and provide necessary data to the users. The various components of DBMS are shown in Figure 1
  • 10. MT-14-I 10 1. DDL Compiler1. DDL Compiler1. DDL Compiler1. DDL Compiler - Data Description Language compiler processes schema definitions specified in the DDL. It includes metadata information such as the name of the files, data items, storage details of each file, mapping information and constraints etc. 2. DML Compiler and Query optimizer2. DML Compiler and Query optimizer2. DML Compiler and Query optimizer2. DML Compiler and Query optimizer - The DML commands such as insert, update, delete, retrieve from the application program are sent to the DML compiler for compilation into object code for database access. The object code is then optimized in the best way to execute a query by the query optimizer and then send to the data manager. 3. Data Manager3. Data Manager3. Data Manager3. Data Manager - The Data Manager is the central software component of the DBMS also knows as Database Control System. 4. Data Dictionary4. Data Dictionary4. Data Dictionary4. Data Dictionary - Data Dictionary is a repository of description of data in the database. It contains information about FigureFigureFigureFigure 1111 Structure of DBMS (Goyal, 2008)
  • 11. MT-14-I 11 • Data - names of the tables, names of attributes of each table, length of attributes, and number of rows in each table. • Relationships between database transactions and data items referenced by them which is useful in determining which transactions are affected when certain data definitions are changed. • Constraints on data i.e. range of values permitted. • Detailed information on physical database design such as storage structure, access paths, files and record sizes. • Access Authorization - is the Description of database users their responsibilities and their access rights. • Usage statistics such as frequency of query and transactions. Data dictionary is used to actually control the data integrity, database operation and accuracy. It may be used as a important part of the DBMS. 5. Data Files5. Data Files5. Data Files5. Data Files ---- It contains the data portion of the database. 6. Compiled DML6. Compiled DML6. Compiled DML6. Compiled DML ---- The DML complier converts the high level Queries into low level file access commands known as compiled DML. 7. End Users7. End Users7. End Users7. End Users ---- They are already discussed in previous section. Major Features of a DBMS Data SecurityData SecurityData SecurityData Security The DBMS can prevent unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or a
  • 12. MT-14-I 12 subset of it known as a "subschema." For example, in an employee database, some users may be able to view salaries while others may view only work history and medical data. Data IntegrityData IntegrityData IntegrityData Integrity The DBMS can ensure that no more than one user can update the same record at the same time. It can keep duplicate records out of the database; for example, no two customers with the same customer number can be entered. Interactive QueryInteractive QueryInteractive QueryInteractive Query Most DBMSs provide query languages and report writers that let users interactively interrogate the database and analyze its data. This important feature gives users access to all management information as needed. Interactive Data Entry and UpdatingInteractive Data Entry and UpdatingInteractive Data Entry and UpdatingInteractive Data Entry and Updating Many DBMSs provide a way to interactively enter and edit data, allowing you to manage your own files and databases. However, interactive operation does not leave an audit trail and does not provide the controls necessary in a large organization. These controls must be programmed into the data entry and update programs of the application. This is a common misconception about desktop computer DBMSs. Complex business systems can be developed, but not without programming. This is not the same as creating lists of data for your own record keeping. Data IndependenceData IndependenceData IndependenceData Independence With DBMSs, the details of the data structure are not stated in each application
  • 13. MT-14-I 13 program. The program asks the DBMS for data by field name; for example, a coded equivalent of "give me customer name and balance due" would be sent to the DBMS. Without a DBMS, the programmer must reserve space for the full structure of the record in the program. Any change in data structure requires changing all application programs. Evaluator’s Comments if any:
  • 14. MT-14-I 14 Question 2Question 2Question 2Question 2 What is information integration? Answer 2Answer 2Answer 2Answer 2 Information integration is an important feature of Oracle9i database. Oracle provides many features that allows customers to synchronously and asynchronously integrate their data including Oracle streams, Oracle Advanced Queuing, replication and distributed SQL. Oracle also provides gateways to non- Oracle database servers, providing seamless interoperation in heterogeneous environment. Asynchronous integration with Oracle streams: Oracle streams enables the propagation and management of data, transactions and events in a data stream within a database, or from one database to another. The stream routes published information to subscribed destinations. The result is a new feature that provides greater functionality and flexibility than traditional solutions for capturing and managing events, and sharing the events with other databases and applications. Oracle streams provide both message queuing and replication functionality within the Oracle database. To simplify deployment of these specialized information integration solutions, Oracle provides customized APIs and tools for message queuing, replication and data protection solutions.
  • 15. MT-14-I 15 These include: • Advanced queuing for message queuing • Replication with Oracle streams Asynchronous integration with Oracle Advanced replication Oracle also includes Advanced Replication. This is a powerful replication feature first introduced in Oracle 7. Advanced replication is useful for replicating object between Oracle9i database and older versions of the Oracle server. Advanced replication also provides Oracle materialized views; a replication solution targeted for mass deployments and disconnected replicas. Synchronous Integration with distributed SQL Oracle distributed SQL enables synchronous access from one Oracle database, to other Oracle or non-Oracle databases. Distributed SQL supports location independence, making remote objects appear local, facilitating movement of objects between databases without application code changes. Distributed SQL supports both queries and DML operations, and can intelligently optimize execution plans to access data in the most efficient manner. Evaluator’s Comments if any:
  • 16. MT-14-I 16 Question 3Question 3Question 3Question 3 What is the meaning of extended ER models? Answer 3Answer 3Answer 3Answer 3 • The Extended Entity-Relationship (EER) model is a conceptual (or semantic) data model, capable of describing the data requirements for a new information system in a direct and easy to understand graphical notation. • Data requirements for a database are described in terms of a conceptual schema, using the EER model. • EER schemata are comparable to UML class diagrams.
  • 17. MT-14-I 17 FigureFigureFigureFigure 2222 Extended ER Model Constructs (Mylopoulos, 2004) The EER model mainly consists of entity super types, entity subtypes and entity clustering which are modeled in ER diagram. Evaluator’s Comments if any: Question 4Question 4Question 4Question 4 What are client server systems?
  • 18. MT-14-I 18 Answer 4Answer 4Answer 4Answer 4 ( One response is Similar to answer 10, alternate described below). Alternate response: Client/Server technology is the computer architecture used in almost all automated library systems now being offered to libraries. (KSOU, 2009) FigureFigureFigureFigure 3333 Client - Server Architecture This is a computer architecture that divides functions into client and server subsystems, with standard communication method to facilitate the sharing of information between them. Among the characteristics of a client/server architecture following are the key ones: • The client and server can be distinguished from one another by the differences in tasks they perform.
  • 19. MT-14-I 19 • The client and server usually operate on different computer platforms • Either the client or the server may be upgraded without affecting the other • Client may connect to one or more servers; servers may connect to multiple clients concurrently. Clients always initiate the dialogue by requesting a service • Client/server is most easily differentiated from hierarchical processing, which used a host and slave , by the way a PC functions within a system. In client/server the PC based client communicates with the server as a computer; in hierarchical processing the PC emulates a dumb terminal to communicate with the host. In client/server the client controls part of the activity, but in hierarchical processing the host controls all activities. A client PC almost always does the following in a client/server environment: screen handling, menu or command interpretation, data entry, help processing, and error recovery. The dividing line between the client and server can be anywhere along a broad continuum: at one end only the user interface has been moved onto the
  • 20. MT-14-I 20 client; at the other, almost all applications have been moved onto the client and the database may be distributed. Evaluator’s Comments if any: Question 5Question 5Question 5Question 5 What is normalization? Answer 5Answer 5Answer 5Answer 5 In the field of relational database design, normalization (Anonymous, 2009) is a systematic way of ensuring that a database structure is suitable for general- purpose querying and free of certain undesirable characteristics—insertion, update, and deletion anomalies—that could lead to a loss of data integrity. E.F. Codd, the inventor of the relational model, introduced the concept of normalization and what we now know as the First Normal Form (1NF) in 1970.Codd went on to define the Second Normal Form (2NF) and Third Normal Form (3NF) in 1971,and Codd and Raymond F. Boyce defined the Boyce-Codd Normal Form in 1974.Higher normal forms were defined by other theorists in
  • 21. MT-14-I 21 subsequent years, the most recent being the Sixth Normal Form (6NF) introduced by Chris Date, Hugh Darwen, and Nikos Lorentzos in 2002. Informally, a relational database table (the computerized representation of a relation) is often described as "normalized" if it is in the Third Normal Form. Most 3NF tables are free of insertion, update, and deletion anomalies, i.e. in most cases 3NF tables adhere to BCNF, 4NF, and 5NF (but typically not 6NF). The normal forms (abbrev. NF) of relational database theory provide criteria for determining a table's degree of vulnerability to logical inconsistencies and anomalies. The higher the normal form applicable to a table, the less vulnerable it is to inconsistencies and anomalies. Each table has a "highest normal form" (HNF): by definition, a table always meets the requirements of its HNF and of all normal forms lower than its HNF; also by definition, a table fails to meet the requirements of any normal form higher than its HNF. The normal forms are applicable to individual tables; to say that an entire database is in normal form n is to say that all of its tables are in normal form n. Newcomers to database design sometimes suppose that normalization proceeds in an iterative fashion, i.e. a 1NF design is first normalized to 2NF, then to 3NF, and so on. This is not an accurate description of how normalization typically works. A sensibly designed table is likely to be in 3NF on the first attempt; furthermore, if it is 3NF, it is overwhelmingly likely to have an HNF of 5NF.
  • 22. MT-14-I 22 Achieving the "higher" normal forms (above 3NF) does not usually require an extra expenditure of effort on the part of the designer, because 3NF tables usually need no modification to meet the requirements of these higher normal forms. The main normal forms are summarized below. TableTableTableTable 1111 Normal Forms Normal formNormal formNormal formNormal form Defined byDefined byDefined byDefined by Brief definitionBrief definitionBrief definitionBrief definition First normal form (1NF) E.F. Codd (1970) Table faithfully represents a relation and has no repeating groups Second normal form (2NF) E.F. Codd (1971) No non-prime attribute in the table is functionally dependent on a part (proper subset) of a candidate key Third normal form (3NF) E.F. Codd (1971) Every non-prime attribute is non- transitively dependent on every key of the table Boyce-Codd normal form (BCNF) Raymond F. Boyce and E.F. Codd (1974) Every non-trivial functional dependency in the table is a dependency on a superkey
  • 23. MT-14-I 23 Fourth normal form (4NF) Ronald Fagin (1977) Every non-trivial multivalued dependency in the table is a dependency on a superkey Fifth normal form (5NF) Ronald Fagin (1979) Every non-trivial join dependency in the table is implied by the superkeys of the table Domain/key normal form (DKNF) Ronald Fagin (1981) Every constraint on the table is a logical consequence of the table's domain constraints and key constraints Sixth normal form (6NF) Chris Date, Hugh Darwen, and Nikos Lorentzos (2002) Table features no non-trivial join dependencies at all (with reference to generalized join operator) Evaluator’s Comments if any: Question 6Question 6Question 6Question 6 What are views? Explain its various types?
  • 24. Answer 6Answer 6Answer 6Answer 6 (Ahmad, 1997) In 1975, the American National Standards Institute (ANSI) Standards Planning and Requirements Committee (SPARC) developed standard based on a level approach. Three level approach with data dictionary: 1. External level or View 2. Conceptual level or View 3. Internal level or View • The External level is the way users perceive the data • The Internal level is the way the DBMS and the Operating perceive the data • The Conceptual level provides both the mapping and the independence between the external and the internal levels FigureFigureFigureFigure 4444 Database Views 24 (Ahmad, 1997) In 1975, the American National Standards Institute (ANSI) Standards Planning and Requirements Committee (SPARC) developed standard based on a Three level approach with data dictionary: External level or View Conceptual level or View Internal level or View The External level is the way users perceive the data The Internal level is the way the DBMS and the Operating perceive the data The Conceptual level provides both the mapping and the independence between the external and the internal levels Database Views (Ahmad, 1997) MT-14-I In 1975, the American National Standards Institute (ANSI) Standards Planning and Requirements Committee (SPARC) developed standard based on a three The External level is the way users perceive the data The Internal level is the way the DBMS and the Operating System The Conceptual level provides both the mapping and the independence
  • 25. MT-14-I 25 External View : • The user’s view of the database • Consists of different external views of the database 1. entities 2. attributes • Relationships • Different representation of the same data, e.g. date Conceptual View: • Describes what data is stored in the database and their relationships • Independent of any storage considerations e.g. no. of bytes occupied by Staff No. • Consists of the logical structure of the database as seen by the DBA 1. all entities, attributes and their relationships 2. constraints on data 3. meaning of data 4. security and integrity Internal View: • The physical representation of the database in the computer • Describes how data is stored in the data-base to achieve optimal performance and storage space utilization
  • 26. MT-14-I 26 1. storage allocation for data and indexes 2. record description for storage 3. record placement 4. data compression & encryption techniques Answer 6Answer 6Answer 6Answer 6 (Alternate answer) In database theory, a view consists of a stored query accessible as a virtual table composed of the result set of a query. Unlike ordinary tables (base tables) in a relational database, a view does not form part of the physical schema: it is a dynamic, virtual table computed or collated from data in the database. Changing the data in a table alters the data shown in subsequent invocations of the view. Views can provide advantages over tables: • Views can represent a subset of the data contained in a table • Views can join and simplify multiple tables into a single virtual table • Views can act as aggregated tables, where the database engine aggregates data (sum, average etc) and presents the calculated results as part of the data
  • 27. MT-14-I 27 • Views can hide the complexity of data; for example a view could appear as Sales2000 or Sales2001, transparently partitioning the actual underlying table • Views take very little space to store; the database contains only the definition of a view, not a copy of all the data it presents • Depending on the SQL engine used, views can provide extra security • Views can limit the degree of exposure of a table or tables to the outer world Just as functions (in programming) can provide abstraction, so database users can create abstraction by using views. In another parallel with functions, database users can manipulate nested views, thus one view can aggregate data from other views. Without the use of views the normalization of databases above second normal form would become much more difficult. Views can make it easier to create lossless join decomposition. Just as rows in a base table lack any defined ordering, rows available through a view do not appear with any default sorting. A view is a relational table, and the relational model defines a table as a set of rows. Since sets are not ordered - by definition - the rows in a view are not ordered, either. Therefore, an ORDER BY clause in the view definition is meaningless. The SQL standard (SQL:2003) does not allow an ORDER BY clause in a subselect in a CREATE VIEW statement, just as it is not allowed in a CREATE TABLE statement. However, sorted data can be
  • 28. MT-14-I 28 obtained from a view, in the same way as any other table - as part of a query statement. In Oracle 10g, a view can be created with an ORDER BY clause in a subquery. Evaluator’s Comments if any: Question 7Question 7Question 7Question 7 What is Dynamic SQL? Answer 7Answer 7Answer 7Answer 7 Dynamic SQL is a programming technique that enables you to build SQL statements dynamically at runtime. You can create more general purpose, flexible applications by using dynamic SQL because the full text of a SQL statement may be unknown at compilation. For example, dynamic SQL lets you create a procedure that operates on a table whose name is not known until runtime. Oracle includes two ways to implement dynamic SQL in a PL/SQL application: • Native dynamic SQL, where you place dynamic SQL statements directly into PL/SQL blocks. • Calling procedures in the DBMS_SQL package.
  • 29. MT-14-I 29 You should use dynamic SQL only if you cannot use static SQL to accomplish your goals, or if using static SQL is cumbersome compared to dynamic SQL. However, static SQL has limitations that can be overcome with dynamic SQL. You can use dynamic SQL to create applications that execute dynamic queries, whose full text is not known until runtime. Many types of applications need to use dynamic queries, including: • Applications that allow users to input or choose query search or sorting criteria at runtime • Applications that allow users to input or choose optimizer hints at run time • Applications that query a database where the data definitions of tables are constantly changing • Applications that query a database where new tables are created often Language features: • If you use C/C++, you can call dynamic SQL with the Oracle Call Interface (OCI), or you can use the Pro*C/C++ precompiler to add dynamic SQL extensions to your C code. • If you use COBOL, you can use the Pro*COBOL precompiler to add dynamic SQL extensions to your COBOL code. • If you use Java, you can develop applications that use dynamic SQL with
  • 30. MT-14-I 30 JDBC. Factors to be considered while designing Dynamic SQL. Careful analysis of the below and their affects on the performance needs to be addressed. 1. Permissions 2. Query execution plans 3. Network traffic 4. Using Output parameters 5. How logic is encapsulated Evaluator’s Comments if any: Question 8Question 8Question 8Question 8 What is parsing? Answer 8Answer 8Answer 8Answer 8 Parsing is a subset activity of Database Query Compiler and does the following • Parses SQL query into parse treeparse treeparse treeparse tree • Transforms parse tree into expression tree (logical query plan)expression tree (logical query plan)expression tree (logical query plan)expression tree (logical query plan)
  • 31. MT-14-I 31 • Transforms logical query plan into physical query planphysical query planphysical query planphysical query plan Above sequence is pictorially depicted in Figure FigureFigureFigureFigure 5555 Query Parsing FigureFigureFigureFigure 6666 Query parsing steps
  • 32. MT-14-I 32 FigureFigureFigureFigure 7777 Parsing Tree In Oracle, every statement , be it a DDL, DML, or anything else, gets parsed. Parsing basically means what Oracle understands about the statement and based on that, how it decides to execute it. This process is also known as Optimization of the query. As the name says, the idea is how best Oracle can process the query or in other words, optimize its execution. Parsing is of two types, Hard parse and Soft parse. If the said query is found in Oracle's cache, the query optimization is not needed. Oracle can pick up the optimized query and can execute it. If the query is run for the first time or the query's cached version is obsolete or flushed out from oracle's cache, query needs to be optimized and the process is called Hard parse of the query. Hard parse , in general , is unavoidable as for the very first time, each query needs to
  • 33. MT-14-I 33 be parsed , at least for once. But in the subsequent executions, query should be simply soft parsed and executed. The mechanism which works in the backend for doing all this is called Optimizer. There are two versions of it, Rule Based and Cost Based. The Rule Based optimizer(RBO) is made deprecated from Oracle version release 10g. This was not very much efficient as it was "statement driven". The Cost Based is now the only and supported mode of optimizer which is, as the name suggests, cost based and takes into the account the resource consumption of the query. Evaluator’s Comments if any:
  • 34. MT-14-I 34 Question 9Question 9Question 9Question 9(i)(i)(i)(i) Write a short note on – Concurrency control by time stamps Answer 9Answer 9Answer 9Answer 9(i)(i)(i)(i) Timestamps are processed so that their execution is equivalent to a serial execution in their timestamp order. The timestamp-based concurrency control allows a transaction to read or write a data item x only if x had been last written by an older transaction. Otherwise, it rejects the operation and restarts the transaction. Scheduler tasks: • Scheduler assign each transaction T a unique number, it’s timestamp TS(T). • The timestamp ordering protocol ensures that any conflicting read and write operations are executed in timestamp order. • Each transaction is issued a timestamp when it enters the system. If an old transaction T1 has timestamp TS(T1), a new transaction T2 is assigned time-stamp TS(T2) such that TS(T1) <TS(T2) Two approaches to generate TimestampsTwo approaches to generate TimestampsTwo approaches to generate TimestampsTwo approaches to generate Timestamps:::: 1. Use the value of system, clock as the timestamp; that is, a
  • 35. MT-14-I 35 transaction’s timestamp is equal to the value of the clock when the transaction enters the system. 2. Use a logical counter that is incremented after a new timestamp has been assigned; that is, a transaction’s is equal to the value of the counter when the transaction enters the system. The Rules of Timestamp-Based Scheduling, below example depicts the rules Four Classes • the scheduler receives a request RT(X) • the scheduler receives a request WT(X) • the scheduler receives a request to commit T • the scheduler receives a request to abort T or decides to rollback T Scheduler receives a request RT(X) (a) If TS(T)>=WT(X), the read is physically realizable. i. If C(X) is true, grant the request. ii. If C(X) is false, delay T until C(X) becomes true or the transaction that wrote X aborts. (b) If TS(T)<WT(X), the read is physically unrealizable, abort T and restart it with a new, larger timestamp.
  • 36. MT-14-I 36 Scheduler receives a request WT(X) (a) If TS(T)>=RT(X) and TS(T)>=WT(X), the write is physically realizable and must be performed. i. Write the new value for X ii.Set WT(X):=TS(T), and iii. Set C(X):= false. (b) If TS(T)>=RT(X), but TS(T)<WT(X), then the write is physically realizable, but there is already a later value in X. i. If C(X) is true, then the previous writers of X is committed, and ignore the write by T. ii. If C(X) is false, we must delay T. (c) If TS(T)<=RT(X), the write is physically unrealizable, and T must be rolled back. The scheduler receives a request to commit T. It must find all the database elements X written by T, and set C(X):= true. The scheduler receives a request to abort T or decides to rollback T. Any transaction that was waiting on an element X that T wrote must repeat its attempt to read or write, and see whether the action is now legal
  • 37. MT-14-I 37 after the aborted transaction’s writes are cancelled. Evaluator’s Comments if any: Question 9(ii)Question 9(ii)Question 9(ii)Question 9(ii) Write a short note on – Concurrency control by validation Answer 9(ii)Answer 9(ii)Answer 9(ii)Answer 9(ii) • Another type of optimistic concurrency control • Maintains a record of what active transactions are doing • Just before a transaction starts to write, it goes through a “validation phase” • If a there is a risk of physically unrealizable behavior, the transaction is rolled back Scheduler tasks:
  • 38. MT-14-I 38 • Keep track of each transaction T’s – Read set RS(T): the set of elements T read – Write set WS(T): the set of elements T write • Execute transactions in three phases: – Read. T reads all the elements in RS(T) – Validate. Validate T by comparing its RS(T) an WS(T) with those in other transactions. If the validation fails, T is rolled back – Write. T writes its values for the elements in WS(T) Steps: • START: the set of transactions that have started, but not yet completed validation. For each T, maintain (T, START(T)) • VAL: the set of transactions that have been validated, but not yet finished. For each T, maintain (T, START(T), VAL(T)) • FIN: the set of transaction that have completed. For each T, maintain (T, START(T), VAL(T), FIN(T)) Evaluator’s Comments if any:
  • 39. MT-14-I 39 Question 10Question 10Question 10Question 10 What is centralized and client server architectures? Answer 10Answer 10Answer 10Answer 10 Centralized Systems:Centralized Systems:Centralized Systems:Centralized Systems: • Run on a single computer system and do not interact with other computer systems. • Combines everything into single system including- DBMS software, hardware, application programs, and user interface processing software. • User can still connect through a remote terminal –however, all processing is done at centralized site. • General-purpose computer system: one to a few CPUs and a number of device controllers that are connected through a common bus that provides access to shared memory. • Single-user system (e.g., personal computer or workstation): desk-top unit, single user, usually has only one CPU and one or two hard disks; the OS may support only one user. Multi-user system: more disks, more memory, multiple CPUs, and a multi-user OS. Serve a large number of users who are connected to the system vie terminals. Often called server systems.
  • 40. MT-14-I 40 FigureFigureFigureFigure 8888 Centralized Architecture ClientClientClientClient----Server Systems:Server Systems:Server Systems:Server Systems: • Server systems satisfy requests generated at m client systems, whose general structure is shown below: FigureFigureFigureFigure 9999 Client –Server Architecture Specialized Servers with Specialized functions • Print server
  • 41. MT-14-I 41 • File server • DBMS server • Web server • Email server Clients can access the specialized servers as needed Clients features: • Provide appropriate interfaces through a client software module to access and utilize the various server resources. • Clients may be diskless machines or PCs or Workstations with disks with only the client software installed. • Connected to the servers via some form of a network. Server features; • Provides database query and transaction services to the clients • Relational DBMS servers are often called SQL servers, query servers, or transaction servers • Applications running on clients utilize an Application Program Interface (API) to access server databases via standard interface such as: o ODBC: Open Database Connectivity standard o JDBC: for Java programming access
  • 42. MT-14-I 42 • Client and server must install appropriate client module and server module software for ODBC or JDBC Evaluator’s Comments if any:
  • 43. MT-14-I 43 BibliographyBibliographyBibliographyBibliography Ahmad, E. M. (1997). CMPB244: Database Design. Pahang, Malaysia: Universiti Tenaga Nasional. Anonymous. (2009). Database normalization. Retrieved 2009, from Wikipedia: http://en.wikipedia.org/wiki/Database_normalization Goyal, A. (2008, Feb). STRUCTURE OF DBMS. Retrieved Oct 2009, from DBMSBASICS: http://dbmsbasics.blogspot.com/2008/02/structure-of-dbms.html KSOU. (2009). Advanced DBMS. Delhi: Virtual Education Trust. Mylopoulos, J. (2004). Conceptual Modeling. Toronto, Canada: Department of Computer Science, University of Toronto .