0% found this document useful (0 votes)
47 views24 pages

Database Management System: CSMI14

This leads to data redundancy and inconsistencies if the duplicated data is updated differently in different places. 2. Difficulty in accessing data - Each application program can access only the files it is designed for. - No way to access data in other files or to combine data from multiple files. 3. Data isolation - Each application program deals with its own set of files. No sharing of data between programs. 4. Integrity problems - No mechanisms to ensure data integrity if same data is duplicated across multiple files. 5. Atomicity problems - Operations like withdrawals from bank account involve multiple files. No way to ensure all or none updates. 6. Concurrent-access anomalies

Uploaded by

Jagannathan K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views24 pages

Database Management System: CSMI14

This leads to data redundancy and inconsistencies if the duplicated data is updated differently in different places. 2. Difficulty in accessing data - Each application program can access only the files it is designed for. - No way to access data in other files or to combine data from multiple files. 3. Data isolation - Each application program deals with its own set of files. No sharing of data between programs. 4. Integrity problems - No mechanisms to ensure data integrity if same data is duplicated across multiple files. 5. Atomicity problems - Operations like withdrawals from bank account involve multiple files. No way to ensure all or none updates. 6. Concurrent-access anomalies

Uploaded by

Jagannathan K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

CSMI14

Database Management System


3 Credit Course

Dr. A. Saraswathi Priyadharshini


Post-Doctoral Fellow E-Mail: [email protected] & [email protected]
Department of CSE Contact number : 9025917578
NIT-Trichy
1
Class Time Table –July 2020 Session
Total Hours : 38hours
75% attendance is Mandatory

Tuesday : 2 to 2.50 PM

Wednesday : 3 to 3.50 PM

Thursday : 2 to 2.50 PM

Last 10 min – Q & A Session

2
Course Plan – July 2020 Session
%
S. No. Mode of Assessment Week/Date Duration
Weightage
2nd week of October
1 Assessment I 1 hour 20
2020
4th week of October
2 Assessment II 1 hour 20
2020
Last week of September
3 Assignment - 10
2020
2nd week of November
4 Project - 20
2020
4th week of November
CPA Compensation Assessment* 1 hour 20
2020
As per academic
5 Final Assessment * 2 hours 30
schedule

3
Course Overview
Syllabus No. of Hours
Unit – I : Introduction: Purpose of Database System -– Views of data – Data Models – Database 8
Languages - Database System Architecture – components of DBMS –Entity–Relationship model (E-
R model ) – E-R Diagram notation, Examples.
Unit – II : Relational Model: Relational Data Model - Concept of relations, schema-instance 8
distinction, keys, integrity rules, relational algebra operators, SQL: data definition, data
manipulation, aggregate function, Null Values, nested sub queries, Joined relations. Work with
MySQL Workbench.
Unit – III : Database Design: Dependencies and Normal forms, dependency theory - functional 7
dependencies, Armstrong's axioms for FD's, closure of a set of FD's, minimal covers, definitions of
1NF, 2NF, 3NF and BCNF 4NF, and 5NF, decompositions and desirable properties of them.
Unit – IV : Transaction management: ACID properties, serializability and concurrency control, 7
Lock based concurrency control (2PL, Deadlocks), database recovery management.
Unit – V : Implementation Techniques: Overview of Physical Storage Media – Magnetic Disks – 8
RAID – Tertiary storage – Organization of Records in Files – Indexing and Hashing–Ordered
Indices - primary, secondary index structures –Static Hashing – Dynamic Hashing.

4
Text Books
• A. Silberschatz, Henry F. Korth, and S. Sudharshan, “Database System Concepts”, 5th Ed,
Tata McGraw Hill, 2006.
• C. J. Date, A. Kannan and S. Swamynathan, “An Introduction to Database Systems”, 8thed,
Pearson Education, 2006.

References Books
• RamezElmasri and Shamkant B. Navathe, “Fundamentals of Database Systems”, Fourth
Edition, Pearson/Addisionwesley, 2007
• Raghu Ramakrishnan, “Database Management Systems”, Third Edition, McGraw Hill, 2003
• S. K. Singh, “Database Systems Concepts, Design and Applications”, First Edition, Pearson
Education, 2006

5
Unit – I : Introduction – 8 Hours

• Purpose of Database System


• Views of data Book 1: 1.2, 1.3, 1.4
• Data Models
• Database Languages
• Database System Architecture
• Components of DBMS
• Entity–Relationship model (E-R model )
• E-R Diagram notation
• Examples

6
• Database = Collection of data
• contains information that are common to most enterprises or also information that is
specific to the category of the enterprise

7
Database-management system (DBMS)

• Computerized management of commercial data.


• It is a collection of interrelated data and a set of programs to access those data.
• They are designed to manage large bodies of information.
• Goal : Provide a way to store and retrieve the information that is both convenient and
efficient.
• Ensure the safety of the information stored, despite system crashes or attempts at
unauthorized access.
• If data are to be shared among several users, the system must avoid possible anomalous
results.

8
• online bookstore - accessing data stored in a database
• When you enter an order online - your order is stored in a database
• bank Web site - bank balance and transaction information is retrieved from the bank’s
database system.
• When you access a Web site, information about you may be retrieved from a database to
select which advertisements you should see.

• How we manage data?


• Define structures for storage of information.
• Provide mechanisms for the manipulation of information.

9
Database-System Applications
• Enterprise Information

◦ Sales: For customer, product, and purchase information.

◦ Accounting: For payments, receipts, account balances, assets and other accounting
information.

◦ Human resources: For information about employees, salaries, payroll taxes, and for generation
of paychecks.

◦ Manufacturing: For management of the supply chain and for tracking production of items in
factories, inventories of items in warehouses and stores, and orders for items.

◦ Online retailers: For sales data noted above plus online order tracking, generation of
recommendation lists, and maintenance of online product evaluations.

10
• Banking and Finance
◦ Banking: For customer information, accounts, loans, and banking transactions.

◦ Credit card transactions: For purchases on credit cards and generation of monthly statements.

◦ Finance: For storing information about holdings, sales, and purchases; also for storing real-
time market data to enable online trading by customers and automated trading by the firm.

• Universities: For student information, course registrations, and grades

• Airlines: For reservations and schedule information.

• Telecommunication: For keeping records of calls made, generating monthly bills, maintaining
balances on prepaid calling cards, and storing information about the communication networks.

11
Purpose of Database System

• Earlier days: kept the information on a computer by storing it in operating system files.
• File-processing system:
• System stores permanent records in various files
• Needs different application programs to extract records from, and add records to, the
appropriate files.
• It is supported by a conventional operating system.

12
• System has a number of application programs that allow users to manipulate the
information:

• Add new students, instructors, and courses

• Register students for courses and generate class rosters

• Assign grades to students, compute grades, and generate transcripts


• System programmers wrote these application programs
• New application programs are added to the system as the need arises.
• Ex: Suppose that a university decides to create a new major (say, computer science).
• New application programs to deal with rules specific to the new major.
• New application programs to handle new rules in the university.

13
Disadvantages of file-processing system
• Data redundancy and inconsistency
• Difficulty in accessing data
• Data isolation
• Integrity problems
• Atomicity problems
• Concurrent-access anomalies
• Security problems

14
1. Data redundancy and inconsistency
• Different programmers create the files and application programs over a long period

• Various files are likely to have different structures

• Programs may be written in several programming languages.

• Moreover, the same information may be duplicated in several places (files).

• Ex: if a student has a double major, the address and telephone number of that student appear
in both department files
• This redundancy leads to higher storage and access cost.

• Data inconsistency : Various copies of the same data may no longer agree.

• Ex: student changes address - reflected in one department records but not elsewhere.

15
2. Difficulty in accessing data
• Need to find out the names of all students who live within a particular postal-code area.

• Either obtain the list of all students and extract the needed information manually

• Ask a programmer to write the necessary application program.

• Needs to trim that list to include only those students who have taken at least 60 credit hours.

• Conventional file-processing environments do not allow needed data to be retrieved in a


convenient and efficient manner.

• “More responsive data-retrieval systems are required for general use”

16
3. Data isolation & Integrity problems
• Data isolation: Data are scattered in various files in different formats, writing new application
programs to retrieve the appropriate data is difficult.
• Integrity problems: Data values stored in the database must satisfy certain types of
consistency constraints.
• University maintains an account for each department, and records the balance amount.
• Requirement : Account balance of a department may never fall below zero.
• Enforce these constraints by adding appropriate code in the various application programs.
• Gets complicated :
• when new constraints are added
• when constraints involve several data items from different files.

17
4. Atomicity problems
• A computer system, like any other device, is subject to failure.
• In many applications, it is crucial that, if a failure occurs, the data be restored to the
consistent state that existed prior to the failure.
• Consider a program to transfer $500 from the account A to account B.
• If a system failure occurs during the program execution, results in inconsistent database state
• It is possible that the $500 was removed from the balance of account A
• But was not credited to the balance of account A
• It is essential to database consistency that either both the credit and debit occur, or that
neither occur : the funds transfer must be atomic—it must happen in its entirety or not at all.
• It is difficult to ensure atomicity in a conventional file-processing system.

18
5. Concurrent-access anomalies
• For the sake of overall performance of the system and faster response, many systems allow
multiple users to update the data simultaneously and may result in inconsistent data.
• Ex: account with a balance of $10,000. Two people debit at the same time $500 and $100.
• Suppose that the programs executing on behalf of each withdrawal read the old balance,
reduce that value by the amount being withdrawn, and write the result back.
• They may both read the value $10,000, and write back $9500 and $9900, respectively.
• Account balance may contain either $9500 or $9900, rather than the correct value of $9400.
• Solution : System must maintain some form of supervision.
• But supervision is difficult to provide because data may be accessed by many different
application programs that have not been coordinated previously.

19
6. Security problems
• Not every user of the database system should be able to access all the data.
• For example, in a university, payroll personnel need to see only that part of the database
that has financial information.
• They do not need access to information about academic records.
• But, since application programs are added to the file-processing system in an ad hoc
manner, enforcing such security constraints is difficult.

20
Companies DBMS
Oracle MySQL
IBM DB2
Microsoft MSSQL

• Machine learning
• Neural Networks
• Big Data Analytics
• Artificial Intelligence
• Computer Vision

• Internet of Things
• Hacking
• Block chain
• Cloud computing
• Natural Language Processing
• Deep learning
21
• Assignment Topic (10 marks)
Learn/Predict
• What is the need for you to study DBMS?
DBMS
• Are there any standard DBMS available? Discuss on it.

Department Specific (ECE, EEE, etc…,)


• Last week of Sep’2020.
Companies – Job opportunities • Be Specific, No stories
• Not more than 4 pages
• What are all the real world issues with that DBMS? • No Duplicate Copies
Example.
(E-commerce – Displaying irrelevant items

aircraft launch failure --- missing hyphen)

22
1. Project : Download MySQL workbench and explore it
2. Grading - No prerequisite subjects
3. Book download – Prefer book

23
Thank You

24

You might also like