0% found this document useful (0 votes)
87 views20 pages

Module-5: CSIT-102

The document provides information about data base management systems and relational databases. It discusses the purpose of database systems in overcoming the limitations of file-based data storage. Key advantages of DBMS include minimizing data redundancy, ensuring data integrity, and supporting simultaneous access by multiple users. The document also describes database architecture models like two-tier and three-tier, and data models such as hierarchical, network, and relational. Relational databases organize data into tables with rows and columns that can be related through attributes.

Uploaded by

Abdur Rahman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views20 pages

Module-5: CSIT-102

The document provides information about data base management systems and relational databases. It discusses the purpose of database systems in overcoming the limitations of file-based data storage. Key advantages of DBMS include minimizing data redundancy, ensuring data integrity, and supporting simultaneous access by multiple users. The document also describes database architecture models like two-tier and three-tier, and data models such as hierarchical, network, and relational. Relational databases organize data into tables with rows and columns that can be related through attributes.

Uploaded by

Abdur Rahman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Module-5

CSIT-102
DATA BASE MANAGEMENT SYSTEM

Data Base: A structured set of Data or Database is a


collection of data, typically describing the activities
of one or more related organizations. Database
might contain information about the following:

 Entities
 Relationships
Purpose of Database System
■In the early days, database applications were
built on top of file systems
■Drawbacks of using file systems to store data:
Data redundancy and inconsistency- Multiple file
formats, duplication of information in different files
Difficulty in accessing data- Need to write a new
program to carry out each new task
Data isolation — multiple files and formats
Integrity problems- Integrity constraints (e.g. account
balance > 0) become part of program code. Hard to add
new constraints or change existing ones
Purpose of Database System
Concurrent access by multiple users

Concurrent accessed needed for performance

Uncontrolled concurrent accesses can lead to
inconsistencies
– E.g. two people reading a balance and
updating it at the same time
Security problems
■Database systems offer solutions to all the
above problems
FUNCTIONS OF A DBMS
AData
A Data
Buffer Definition
Management:
Manipulation
Concurrency This
Languageis(DML)
function responsible
to
Language
Control:
A
for Data
A Data
Buffer This (DDL)
Management:allow
Definition
Manipulation
Concurrency
insert,
transferring
update, dataThis
deleteto
shared
to
Language
function
Language
and query
from
Control: access
define
is(DML)
main
data
This in to
thethe
amemory
responsible
to
(DDL)
allow
insert,
for transferring
update, storage.
Database. delete
data to
database.
database.
and
to secondary
shared
and define
query
from access
main
data in to
thethe
amemory
Database.
database.
database.
and secondary storage.

Qu
Qu
er
er
y
y
Pr
Pr
oc
oc
es
es
sin
sin
g
g
an
an
d
d
Op
Op
ti
ti
mi
mi
za
za
tio
tio
n:
n:
It
It
de
de
ter
ter
mi
mi
ne
ne
s
s
th
th
e
e
op
op
ti
ti
m
m
u
u
m
m
str
str
at
at
eg
eg
y
y
for
for
a
a
qu
qu
er
er
y
y
ex
ex
ec
ec
uti
uti
on
on
..
FUNCTIONS OF A DBMS
Security
Data Integrity:
Recovery Control:
: The The
DBMS The
must
DBMS provides
should prevent the
take steps to ensure that if
Security
Data
Recovery
the Integrity:
Control:
: The
database DBMS
fails, The The
must
it remains
facility
unauthorized
for enforcing
access to
DBMS
take
in should
provides
steps prevent
to ensure
a consistent state. the
that if
the
integrity
database.
the database
constraints .
facility for fails,
unauthorized it remains
enforcing
access to
in a consistent state.
the database.
integrity constraints .

D
D
at
at
a
a
Di
Di
cti
cti
on
on
ar
ar
y:
y:
A
A
D
D
B
B
M
M
S
S
in
in
cl
cl
ud
ud
es
es
a
a
re
re
po
po
sit
sit
or
or
y
y
fo
fo
rr
st
st
or
or
in
in
g
g
m
m
et
et
a
a
da
da
ta
ta
..
CAPABILITIES OF DBMS
DBMS- ADVANTAGES

Greater processing power

Fits the needs of many medium to large-sized organizations

Provides user views relevant to tasks performed.

Minimized Redundancy

Data Integrity
DBMS- ADVANTAGES
Ensures data integrity by managing transactions (ACID test =
atomicity, consistency, isolation, durability)  

Supports simultaneous access 

Enforces design criteria in relation to data format and structure 

Provides backup and recovery controls

Advanced security
DBMS- DISADVANTAGES
Difficult to learn

Packaged separately from the operating system

Slower processing speeds

Requires skilled administrators

Expensive
DATABASE ARCHITECTURE:

Database Architecture essentially describe the


location of all the pieces of information that
make up the database application. The database
architecture can be broadly classified into two
categories:

Three – Tier
Architecture
Two – tier
Architecture
2-TIER
ARCHITECTURE
The two-tier architecture is a client server architecture in
which the client contains the presentation code and the
SQL statement for data access. The database server
processes the SQL statements and sends query results
back to the client.
The client or the first tier is primarily responsible for the
presentation of data to the user and the server or the second tier
is primarily responsible for supplying data servers to the client.
3-TIER ARCHITECTURE
A three-tier or a multi tier architecture has
client, server and database. Where the client
request is sent to the server and the server in
turn sends the request to the database. The
database sends back the information/data
required to the server which in turn sends it to
the client.
DBMS VS FMS
DBMS VS FMS
DBMS FMS
No duplication of data is Duplication of data is occur in
possible in DBMS. FMS.
The concept of Data The concept of Data
Independence is available in Independence is not available
DBMS. in FMS.
In DBMS the security level is In FMS the security is low.
high
The problem of data In FMS the problem of data
redundancy is not in DBMS. redundancy is there.
In DBMS large amount of data In FMS large amount of data
can be stored. can not be stored.
Multiple users can share the Multiple users can not share
data from a single database the data from a single file.
simultaneously.
In database approach, a single In traditional file processing
repository of data is system the application is
maintained and accessed by developed for a specific
many users. purpose and they will access
specific database only.
DATA MODELS
Relation
Hierarchica
Network
allModel
Model
Model
HIERARCHICAL MODEL:

Hierarchical databases organize data under the premise of a


basic parent/child relationship.

 Each parent can have many children


 But each child can only have one parent
 Are fast and simple
 Inflexible as the relationship is restricted to one-to-many.

DIMAT

BE

PGDM
ELECTRONICS MECHANICAL
MBA
COMPUTER SCIENCE
NETWORK DATA MODEL:

Data model that creates relationships among data in which


subordinate records can be linked to more than one data
element.
Another way:
Network data model organize data as a network and the
network model allows each record to have multiple
parent and child records.
RELATIONAL DATA MODEL

Data model based on the simple concept of tables in order to


capitalize on characteristics of rows and columns of data.
 Relations: The tables of rows and columns used in a
relational database.
 Tuple: A row of data in the relational database model.
 Attribute: A column of data in the relational database.

Another way:

A relational database allows the definition of data structures,


storage and retrieval operations and integrity constraints. In
such a database the data and relations between them are
organized in tables.
RELATIONAL DATA MODEL

You might also like