Database Systems: A Practical Approach to Design, Implementation, and Management Sixth Edition
Introduction to Databases
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Copyright By PowCoder代写 加微信 powcoder
Learning Objectives (1 of 2)
1.1 Some common uses of database systems. 1.2 Characteristics of file-based systems.
1.3 Problems with file-based approach.
1.4 Meaning of the term database.
1.5 Meaning of the term Database Management System (DBMS).
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Learning Objectives (2 of 2)
1.6 Typical functions of a DBMS.
1.7 Major components of the DBMS environment. 1.8 Personnel involved in the DBMS environment. 1.9 History of the development of DBMSs.
1.10 Advantages and disadvantages of DBMSs.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Examples of Database Applications
• Purchases from the supermarket
• Purchases using your credit card
• Booking a holiday at the travel agents • Using the local library
• Taking out insurance
• Renting a video
• Using the Internet
• Studying at university
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
File-Based Systems
• Collection of application programs that perform services for the end users (e.g. reports).
• Each program defines and manages its own data.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
File-Based Processing
Sales Files
PropertyForRent (propertyNo, street, city, postcode, type, rooms, rent, and ownerNo) PrivateOwner (ownerNo, fName, lName, address, telNo)
Client (clientNo, fName, lName, address, telNo, prefType, maxRent)
Contracts files
Lease (leaseNo, propertyNo, clientNo, rent, paymentMethod, deposit, paid, rentStart, rentFinish, duration)
PropertyForRent (propertyNo, street, city, postcode, rent)
Client (clientNo, fName, lName, address, telNo)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Limitations of File-Based Approach (1 of 2)
• Separation and isolation of data
– Each program maintains its own set of data.
– Users of one program may be unaware of potentially useful data held by other programs.
• Duplication of data
– Same data is held by different programs.
– Wasted space and potentially different values and/or different formats for the same item.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Limitations of File-Based Approach (2 of 2) • Data dependence
– File structure is defined in the program code. • Incompatible file formats
– Programs are written in different languages, and so cannot easily access each other’s files.
• Fixed Queries/Proliferation of application programs
– Programs are written to satisfy particular functions. – Any new requirement needs a new program.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Approach (1 of 3) • Arose because:
– Definition of data was embedded in application programs, rather than being stored separately and independently.
– No control over access and manipulation of data beyond that imposed by application programs.
– the database and Database Management System
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
• Shared collection of logically related data (and a description of this data), designed to meet the information needs of an organization.
• System catalog (metadata) provides description of data to enable program–data independence.
• Logically related data comprises entities, attributes, and relationships of an organization’s information.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Management System (DBMS) (1 of 2)
• A software system that enables users to define, create,
maintain, and control access to the database.
• (Database) application program: a computer program that interacts with database by issuing an appropriate request (SQL statement) to the DBMS.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Management System (DBMS) (2 of 2)
PropertyForRent (propertyNo, street, city, postcode, type, rooms, rent, ownerNo) PrivateOwner (ownerNo, fname, lName, address, telNo)
Client (clientNo, fName, lName, address, telNo, prefType, maxRent)
Lease (leaseNo, propertyNo, clientNo, paymentMethod, deposit, paid, rentStart, rentFinish)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Approach (2 of 3) • Data definition language (DDL).
– Permits specification of data types, structures and any data constraints.
– All specifications are stored in the database. • Data manipulation language (DML).
– General enquiry facility (query language) of the data.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Approach (3 of 3)
• Controlled access to database may include: – a security system
– an integrity system
– a concurrency control system
– a recovery control system – a user-accessible catalog.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
• Allows each user to have his or her own view of the database.
• A view is essentially some subset of the database.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Views – Benefits
• Reduce complexity
• Provide a level of security
• Provide a mechanism to customize the appearance of the database
• Present a consistent, unchanging picture of the structure of the database, even if the underlying database is changed
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Components of DBMS Environment (1 of 3)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Components of DBMS Environment (2 of 3) • Hardware
– Can range from a PC to a network of computers. • Software
– DBMS, operating system, network software (if necessary) and also the application programs.
– Used by the organization and a description of this
data called the schema.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Components of DBMS Environment (3 of 3) • Procedures
– Instructions and rules that should be applied to the design and use of the database and DBMS.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Roles in the Database Environment
• Data Administrator (DA)
• Database Administrator (DBA)
• Database Designers (Logical and Physical) • Application Programmers
• End Users (naive and sophisticated)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
History of Database Systems
• First-generation
– Hierarchical and Network
• Second generation – Relational
• Third generation
– Object-Relational – Object-Oriented
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Advantages of DBMSs (1 of 2)
• Control of data redundancy
• Data consistency
• More information from the same amount of data • Sharing of data
• Improved data integrity
• Improved security
• Enforcement of standards
• Economy of scale
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Advantages of DBMSs (2 of 2)
• Balance conflicting requirements
• Improved data accessibility and responsiveness
• Increased productivity
• Improved maintenance through data independence • Increased concurrency
• Improved backup and recovery services
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Disadvantages of DBMSs
• Complexity
• Cost of DBMS
• Additional hardware costs • Cost of conversion
• Performance
• Higher impact of a failure
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Systems: A Practical Approach to Design, Implementation, and Management Sixth Edition
Database Environment
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Learning Objectives (1 of 2)
2.1 Purpose of three-level database architecture.
2.2 Contents of external, conceptual, and internal levels.
2.3 Purpose of external/conceptual and conceptual/internal mappings.
2.4 Meaning of logical and physical data independence. 2.5 Distinction between DDL and DML.
2.6 A classification of data models.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Learning Objectives (2 of 2)
2.7 Purpose/importance of conceptual modeling.
2.8 Typical functions and services a DBMS should provide.
2.9 Function and importance of system catalog.
2.10 Software components of a DBMS.
2.11 Meaning of client–server architecture and advantages of this type of architecture for a DBMS.
2.12 Function and uses of Transaction Processing Monitors.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Objectives of Three-Level Architecture (1 of 2)
• All users should be able to access same data.
• A user’s view is immune to changes made in other views.
• Users should not need to know physical database storage details.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Objectives of Three-Level Architecture (2 of 2)
• DBA should be able to change database storage
structures without affecting the users’ views.
• Internal structure of database should be unaffected by changes to physical aspects of storage.
• DBA should be able to change conceptual structure of database without affecting all users.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
ANSI-SPARC Three-Level Architecture (1 of 3)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
ANSI-SPARC Three-Level Architecture (2 of 3)
• External Level
– Users’ view of the database.
– Describes that part of database that is relevant to a particular user.
• Conceptual Level
– Community view of the database.
– Describes what data is stored in database and relationships among the data.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
ANSI-SPARC Three-Level Architecture (3 of 3) • Internal Level
– Physical representation of the database on the computer.
– Describes how the data is stored in the database.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Differences Between Three Levels of ANSI- SPARC Architecture
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Data Independence (1 of 2) • Logical Data Independence
– Refers to immunity of external schemas to changes in conceptual schema.
– Conceptual schema changes (e.g. addition/removal of entities).
– Should not require changes to external schema or rewrites of application programs.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Data Independence (2 of 2) • Physical Data Independence
– Refers to immunity of conceptual schema to changes in the internal schema.
– Internal schema changes (e.g. using different file organizations, storage structures/devices).
– Should not require change to conceptual or external schemas.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Data Independence and the ANSI-SPARC Three-Level Architecture
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Languages (1 of 2) • Data Definition Language (DDL)
– Allows the DBA or user to describe and name entities, attributes, and relationships required for the application
– plus any associated integrit and security constraints.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Languages (2 of 2)
• Data Manipulation Language (DML)
– Provides basic data manipulation operations on data held in the database.
• Procedural DML
– allows user to tell system exactly how to manipulate
• Non-Procedural DML
– allows user to state what data is needed rather than how it is to be retrieved.
• Fourth Generation Languages (4GLs)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Data Model (1 of 2)
• Integrated collection of concepts for describing data, relationships between data, and constraints on the data in an organization.
• Data Model comprises:
– a structural part;
– a manipulative part;
– possibly a set of integrity rules.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Data Model (2 of 2) • Purpose
– To represent data in an understandable way.
• Categories of data models include: – Object-based
– Record-based
– Physical.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Data Models
• Object-Based Data Models – Entity-Relationship
– Semantic
– Functional
– Object-Oriented.
• Record-Based Data Models – Relational Data Model
– Network Data Model
– Hierarchical Data Model.
• Physical Data Models
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Relational Data Model
22 Deer Rd
16 Argyll St
163 Main St
32 Manse Rd
Supervisor
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Network Data Model
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Hierarchical Data Model
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Conceptual Modeling
• Conceptual schema is the core of a system supporting all user views.
• Should be complete and accurate representation of an organization’s data requirements.
• Conceptual modeling is process of developing a model of information use that is independent of implementation details.
• Result is a conceptual data model.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Functions of a DBMS (1 of 2)
• Data Storage, Retrieval, and Update. • A User-Accessible Catalog.
• Transaction Support.
• Concurrency Control Services.
• Recovery Services.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Functions of a DBMS (2 of 2)
• Authorization Services.
• Support for Data Communication.
• Integrity Services.
• Services to Promote Data Independence. • Utility Services.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
System Catalog
• Repository of information (metadata) describing the data in the database.
• One of the fundamental components of DBMS.
• Typically stores:
– names, types, and sizes of data items;
– constraints on the data;
– names of authorized users;
– data items accessible by a user and the type of access;
– usage statistics.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Components of a DBMS
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Components of Database Manager
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Multi-User DBMS Architectures
• Teleprocessing • File-server
• Client-server
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Teleprocessing
• Traditional architecture.
• Single mainframe with a number of terminals attached. • Trend is now towards downsizing.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
File-Server
• File-server is connected to several workstations across a network.
• Database resides on file-server.
• DBMS and applications run on each workstation.
• Disadvantages include:
– Significant network traffic.
– Copy of DBMS on each workstation.
– Concurrency, recovery and integrity control more complex.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
File-Server Architecture
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Traditional Two-Tier Client-Server (1 of 3) • Client (tier 1) manages user interface and runs
applications.
• Server (tier 2) holds database and DBMS.
• Advantages include:
– wider access to existing databases; – increased performance;
– possible reduction in hardware costs; – reduction in communication costs;
– increased consistency.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Traditional Two-Tier Client-Server (2 of 3)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Traditional Two-Tier Client-Server (3 of 3)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Three-Tier Client-Server (1 of 3)
• Client side presented two problems preventing true
scalability:
– ‘Fat’ client, requiring considerable resources on client’s computer to run effectively.
– Significant client side administration overhead.
• By 1995, three layers proposed, each potentially running
on a different platform.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Three-Tier Client-Server (2 of 3)
• Advantages:
– ‘Thin’ client, requiring less expensive hardware.
– Application maintenance centralized.
– Easier to modify or replace one tier without affecting others.
– Separating business logic from database functions makes it easier to implement load balancing.
– Maps quite naturally to Web environment.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Three-Tier Client-Server (3 of 3)
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Transaction Processing Monitors
• Program that controls data transfer between clients and servers in order to provide a consistent environment, particularly for Online Transaction Processing (OLTP).
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
TPM as Middle Tier of 3-Tier Client-Server
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Database Systems: A Practical Approach to Design, Implementation, and Management Sixth Edition
Database Architectures and the Web Transparencies
Slides in this presentation contain hyperlinks. JAWS users should be able to get a list of links by using INSERT+F7
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Learning Objectives (1 of 2)
3.1 The meaning of the client–server architecture and the
advantages of this type of architecture for a DBMS.
3.2 The difference between two-tier, three-tier and n-tier client–server architectures.
3.3 About cloud computing and data as a service (DaaS) and database as a service (DBaaS).
3.4 Software components of a DBMS.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Learning Objectives (2 of 2)
3.5 The purpose of a Web service and the technological
standards used to develop a Web service.
3.6 The meaning of service-oriented architecture (SOA).
3.7 The difference between distributed DBMSs, and distributed processing.
3.8 The architecture of a data warehouse.
3.9 About cloud computing and cloud databases. 3.10 The software components of a DBMS.
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
Multi-User DBMS Architectures
• The common architectures that are used to implement multi-user database management systems:
– Teleprocessing – File-Server
– Client-Server
Copyright © 2015, 2010, 2005 , Inc. All Rights Reserved
File-Server
• File-server is connected to several workstations across a network.
• Database resides on file-server.
• DBMS and applications run on each workstation.
• Disadvantages include:
– Significant network traffic.
– Copy of DBMS on each workstation.
– Concurrency, recovery and integrity control more complex.
程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com