Advanced Database Techniques: Lecture#03
Advanced Database Techniques: Lecture#03
LECTURE#03
database planning,
In large database design projects, we can distinguish between two types of designer:
The logical designer must have a thorough and complete understanding of the
organizations data and
any constraints on this data (the constraints are sometimes called business rules).
The physical database designer decides how the logical database design is to
be physically realized.
This involves:
Mapping the logical database design into a set of tables and integrity
constraints
Selecting specific storage structures and access methods for the data to
DBMS
Include programmers who write batch or online applications for other users.
Application programs may be written in a variety of host programming
RAD tools are 4GL tools that enable an application programmer to construct
forms and reports with minimal programming effort.
fields/boxes on a form.
Sophisticated Users
They are familiar with the structure of the database and the
required operation.
project.
GUAM contained the first trace of the forerunner to the hierarchical database
systems
together
as parts of larger components, and so on, until the final product is
assembled.
This structure, which confirms to an upside-down tree, is also known as a
hierarchical structure.
In the mid-1960s, IBM joined NAA to develop GUAM
into what is now known as IMS (Information Management System).
Although one of the earliest commercial DBMSs,
IMS is still the main hierarchical DBMS used by most large mainframe
installations.
DBMS,
which had a profound effect on the information systems of that generation.
The network database was developed partly to address the need to represent
(CODASYL),
The DBTG was heavily influenced by the architecture used on the earliest
DBMSs,
languages:
A schema Data Definition Language (DDL), which enables the
model
by providing an implementation of its data structures and operations
1980s
for example DB2 and SQL/DS from IBM and Oracle from Oracle
Corporation.
Previously separate (and redundant) data files are integrated into a single, logical
structure.
In addition, each occurrence of a data item is recorded ideally in only one place in
the database.
We avoid the wasted storage space.
but it allows the designer to carefully control the type and amount of redundancy.
authorized users.
Authorized users are granted permission to use the database and
each user (or group of users) is provided one or more user views to
the database
but also that new applications can be developed to operate against
of 40,
the DBA to implement integrity constraints to be checked whenever any update operation is
performed
The centralized nature of a database system in a sense requires that a good security
database security.
May take the form of
user names and passwords to
B.
Clearly two updates are required here,
one to withdraw the cash from account A and
the other to deposit it to account B.
The db system can effectively guarantee that either both of them are done
or neither is
even if, e.g. the system fails (say because of a power outage) halfway
data storage
that gives fast access for the most important applications
applications).
It greatly reduces the cost and time for developing new business applications.
There are two important reasons for it: o The DBMS provides many of the standard functions that the programmer would
With central control of database, the DBA (under the direction of DA) can ensure that
Standards are needed for such things as data formats, naming conventions, and