SlideShare a Scribd company logo
1 of 13
Download to read offline
Data and Access Control
Presentation of Distributed Database System
Submitted
by
Muhammad Adeel
20M-UOC/CS-54
Submitted to
Mam Haseena Kainat
2
1
Raja Abdullah Arshad
20M-UOC/CS-115
• Integrity semantic control refers to the mechanisms and
techniques used to ensure data integrity across multiple
nodes or sites of distributed database. Data integrity
refers to the accuracy, consistency and reliability of data
stored in a database.
• Integrity semantic control involves maintaining various
integrity constraints defined for the database. These
constraints can include entity integrity, referential
integrity, domain integrity and business rules specified
by the database schema and application requirements.
Integrity Semantic Control
Techniques
These are some common techniques used for
various integrity constraints.
• Replication: Replicating data across multiple
nodes helps ensure data availability and fault
tolerance. Changes made to data in one node are
propagated to other nodes, maintaining
consistency and integrity.
• Distributed Transactions: It allow multiple
database operations across different nodes to be
treated as a single atomic unit. They ensure that
either all the changes made by a transaction are
committed or none of them, preserving data
integrity.
Techniques
• Two Phase Commit: 2PC is a protocol used in
distributed systems to ensure that all
participating nodes agree on the outcome of a
transaction. It guarantees that either all nodes
commit the transaction or they all abort,
preventing partial updates and maintaining data
integrity.
• Distributed Concurrency Control: Concurrency
control mechanisms such as locking and
timestamp ordering, are employed to handle
concurrent access to data across distributed
nodes. These techniques prevent conflicts and
maintain data consistency and integrity during
concurrent transactions.
Techniques
• Centralized Control: Some distributed database
systems employ a centralized control
mechanisms where a central authority
coordinates and enforces integrity constraints
across all nodes. This approach ensures a global
view of data integrity but may introduce a
single point of failure.
By employing these techniques and mechanisms,
integrity semantic control helps ensure that the
data stored in a distributed database remains
accurate, consistent and reliable across multiple
nodes, even in the presence of failures, updates
and concurrent access.
Centralized Semantic Integrity
Constraints
Integrity constraints a set of rules. It is used to
maintain the quality of data or information.
Integrity constraints ensure that the data insertion,
updating and other processes have to be performed in
such a way that data integrity is not effected.
Types of integrity constraints
• Domain constraints
• Entity integrity constraints
• Referential integrity constraints
• Key constraints
Domain Constraints
Domain constraints can be defined as the
definition of a valid set of values for an attribute.
The datatype of domain includes string,
characters, integers, time, date etc. The value of
the attribute must be available in the
corresponding domain.
Entity Integrity Constraints
The entity integrity constraints states that primary
key value can’t be null.
• This is because the primary key value is used to
identify individual rows in relation and if the
primary key has a null value, then we can’t
identify those rows.
• A table can contain a null value other than the
primary key field.
Referential Integrity Constraints
A refrential integrity constraints is specified
between two tables.
Key Constraints
Keys are the entity set that is used to identify
an entity within its entity set uniquely.
• An entity set can have multiple keys, but
out of which one key will be primary key.
• A primary key can contains a unique
value in the relational table.
Specifications of Integrity Constraints
Integrity constraints are rules or conditions that
are defined on the attributes or relationships of a
database schema. These constraints are used to
ensure the integrity and validity of data stored in a
database. Here are some common specification of
integrity constraints:
• Entity Integrity Constraint: This constraint specifies
that the primary key of a table must have a unique
value and cannot contain null values.
• Domain Integrity Constraint: This constraint defines
the valid range of values for a specific attribute or
column. It specifies the data type, format and
constraints on the allowed values.
• Referential Integrity Constraint: This constraint
establishes a relationship between two tables based
on a foreign key. It ensures that’s values in the
foreign key column of the referenced table.
• Key Constraint: A key constraint defines the
uniqueness of a set of attributes or columns in a table.
It ensures that the combination of values in the
specified attributes is unique within the table.
Specifications of Integrity
Constraints
• Check Constraint: A check constraint defines a
condition that must be satisfied for the values in a
column or combination of columns. It allows you to
satisfy custom conditions that the data must meet.
For example, you can define a check constraint to
ensure that a numeric column only contains positive
values.
• Business Rule Constraint: Business rule constraints
are specific to the requirements and logic of the
application. These constraints are defined based on
the business rules and policies that govern the data.
They ensure that the data adheres to the specific
business requirements.
Thank you 😊💗

More Related Content

Similar to Pre-sentation.pdf

Database and Data Warehousing-Building Business Intelligence
Database and Data Warehousing-Building Business IntelligenceDatabase and Data Warehousing-Building Business Intelligence
Database and Data Warehousing-Building Business Intelligence
Yeng Ferraris Portes
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song song
Lê Anh Trung
 
What are the characteristics and objectives of ETL testing_.docx
What are the characteristics and objectives of ETL testing_.docxWhat are the characteristics and objectives of ETL testing_.docx
What are the characteristics and objectives of ETL testing_.docx
Technogeeks
 

Similar to Pre-sentation.pdf (20)

Database and Data Warehousing-Building Business Intelligence
Database and Data Warehousing-Building Business IntelligenceDatabase and Data Warehousing-Building Business Intelligence
Database and Data Warehousing-Building Business Intelligence
 
Relational data base management system (Unit 1)
Relational data base management system (Unit 1)Relational data base management system (Unit 1)
Relational data base management system (Unit 1)
 
Distributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data ControlDistributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data Control
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraints
 
db promo ppt.pptx
db promo ppt.pptxdb promo ppt.pptx
db promo ppt.pptx
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Relational Database Data validation and Testing Part 4 - SC.pptx
Relational Database Data validation and Testing Part 4 - SC.pptxRelational Database Data validation and Testing Part 4 - SC.pptx
Relational Database Data validation and Testing Part 4 - SC.pptx
 
Relational database (Unit 2)
Relational database (Unit 2)Relational database (Unit 2)
Relational database (Unit 2)
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song song
 
Datawarehousing Terminology
Datawarehousing TerminologyDatawarehousing Terminology
Datawarehousing Terminology
 
What are the characteristics and objectives of ETL testing_.docx
What are the characteristics and objectives of ETL testing_.docxWhat are the characteristics and objectives of ETL testing_.docx
What are the characteristics and objectives of ETL testing_.docx
 
Advance Webpage Devlopment .NET
Advance Webpage Devlopment .NETAdvance Webpage Devlopment .NET
Advance Webpage Devlopment .NET
 
Etl And Data Test Guidelines For Large Applications
Etl And Data Test Guidelines For Large ApplicationsEtl And Data Test Guidelines For Large Applications
Etl And Data Test Guidelines For Large Applications
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Data Quality in Test Automation Navigating the Path to Reliable Testing
Data Quality in Test Automation Navigating the Path to Reliable TestingData Quality in Test Automation Navigating the Path to Reliable Testing
Data Quality in Test Automation Navigating the Path to Reliable Testing
 
1 constraints
1 constraints1 constraints
1 constraints
 
Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)
 
Database Testing: A Detailed Guide
Database Testing: A Detailed GuideDatabase Testing: A Detailed Guide
Database Testing: A Detailed Guide
 
Data Cleaning Techniques
Data Cleaning TechniquesData Cleaning Techniques
Data Cleaning Techniques
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 

Pre-sentation.pdf

  • 1. Data and Access Control Presentation of Distributed Database System Submitted by Muhammad Adeel 20M-UOC/CS-54 Submitted to Mam Haseena Kainat 2 1 Raja Abdullah Arshad 20M-UOC/CS-115
  • 2. • Integrity semantic control refers to the mechanisms and techniques used to ensure data integrity across multiple nodes or sites of distributed database. Data integrity refers to the accuracy, consistency and reliability of data stored in a database. • Integrity semantic control involves maintaining various integrity constraints defined for the database. These constraints can include entity integrity, referential integrity, domain integrity and business rules specified by the database schema and application requirements. Integrity Semantic Control
  • 3. Techniques These are some common techniques used for various integrity constraints. • Replication: Replicating data across multiple nodes helps ensure data availability and fault tolerance. Changes made to data in one node are propagated to other nodes, maintaining consistency and integrity. • Distributed Transactions: It allow multiple database operations across different nodes to be treated as a single atomic unit. They ensure that either all the changes made by a transaction are committed or none of them, preserving data integrity.
  • 4. Techniques • Two Phase Commit: 2PC is a protocol used in distributed systems to ensure that all participating nodes agree on the outcome of a transaction. It guarantees that either all nodes commit the transaction or they all abort, preventing partial updates and maintaining data integrity. • Distributed Concurrency Control: Concurrency control mechanisms such as locking and timestamp ordering, are employed to handle concurrent access to data across distributed nodes. These techniques prevent conflicts and maintain data consistency and integrity during concurrent transactions.
  • 5. Techniques • Centralized Control: Some distributed database systems employ a centralized control mechanisms where a central authority coordinates and enforces integrity constraints across all nodes. This approach ensures a global view of data integrity but may introduce a single point of failure. By employing these techniques and mechanisms, integrity semantic control helps ensure that the data stored in a distributed database remains accurate, consistent and reliable across multiple nodes, even in the presence of failures, updates and concurrent access.
  • 6. Centralized Semantic Integrity Constraints Integrity constraints a set of rules. It is used to maintain the quality of data or information. Integrity constraints ensure that the data insertion, updating and other processes have to be performed in such a way that data integrity is not effected. Types of integrity constraints • Domain constraints • Entity integrity constraints • Referential integrity constraints • Key constraints
  • 7. Domain Constraints Domain constraints can be defined as the definition of a valid set of values for an attribute. The datatype of domain includes string, characters, integers, time, date etc. The value of the attribute must be available in the corresponding domain.
  • 8. Entity Integrity Constraints The entity integrity constraints states that primary key value can’t be null. • This is because the primary key value is used to identify individual rows in relation and if the primary key has a null value, then we can’t identify those rows. • A table can contain a null value other than the primary key field.
  • 9. Referential Integrity Constraints A refrential integrity constraints is specified between two tables.
  • 10. Key Constraints Keys are the entity set that is used to identify an entity within its entity set uniquely. • An entity set can have multiple keys, but out of which one key will be primary key. • A primary key can contains a unique value in the relational table.
  • 11. Specifications of Integrity Constraints Integrity constraints are rules or conditions that are defined on the attributes or relationships of a database schema. These constraints are used to ensure the integrity and validity of data stored in a database. Here are some common specification of integrity constraints: • Entity Integrity Constraint: This constraint specifies that the primary key of a table must have a unique value and cannot contain null values. • Domain Integrity Constraint: This constraint defines the valid range of values for a specific attribute or column. It specifies the data type, format and constraints on the allowed values. • Referential Integrity Constraint: This constraint establishes a relationship between two tables based on a foreign key. It ensures that’s values in the foreign key column of the referenced table. • Key Constraint: A key constraint defines the uniqueness of a set of attributes or columns in a table. It ensures that the combination of values in the specified attributes is unique within the table.
  • 12. Specifications of Integrity Constraints • Check Constraint: A check constraint defines a condition that must be satisfied for the values in a column or combination of columns. It allows you to satisfy custom conditions that the data must meet. For example, you can define a check constraint to ensure that a numeric column only contains positive values. • Business Rule Constraint: Business rule constraints are specific to the requirements and logic of the application. These constraints are defined based on the business rules and policies that govern the data. They ensure that the data adheres to the specific business requirements.