DBMS UNIT-I
DBMS UNIT-I
Database:
A database is a collection of data, typically describing the activities of one or more related
organizations.
1. It is a software system that manages 1. It is a software system used for creating and managing the
and controls the data files in a computer databases. DBMS provides a systematic way to access, update,
system. and delete data.
5. File system is used for storing the 5. Database management system is used for storing the
unstructured data. structured data.
10. If one application fails, it does not 10. If the database fails, it affects all application which depends
affect other application in a system. on it.
ADVANTAGES OF A DBMS
Data Independence: The DBMS provides an abstract view of the data that hides data
representation and storage details.
Efficient Data Access: A DBMS utilizes a variety of sophisticated techniques to store and retrieve
data efficiently.
Data Integrity and Security: If data is always accessed through the DBMS, the DBMS can
enforce integrity constraints. For example, before inserting salary information for an employee,
the DBMS can check that the department budget is not exceeded. Also, it can enforce access
controls that govern what data is visible to different classes of users.
Data Administration: When several users share the data, centralizing the administration of data
can offer significant improvements.
Concurrent Access and Crash Recovery: A DBMS schedules concurrent accesses to the data in
such a manner that users can think of the data as being accessed by only one user at a time. Further,
the DBMS protects users from the effects of system failures.
Reduced Application Development Time: The high-level interface to the data, facilitates quick
application development.
DATA MODEL
● A data model is a collection of high-level data description constructs that hide many low-
level storage details.
● A DBMS allows a user to define the data to be stored in terms of a data model.
● Most database management systems today are based on the relational data model.
● A semantic data model is a more abstract, high-level data model that makes it easier for
a user to come up with a good initial description of the data in an enterprise.
● A widely used semantic data model called the entity-relationship (ER) model allows us to
pictorially denote entities and the relationships among them.
● The central data description construct in this model is a relation, which can be thought of
as a set of records.
● A description of data in terms of a data model is called a schema.
● In the relational model, the schema for a relation specifies its name, the name of each field
(or attribute or column), and the type of each field.
● As an example, student information in a university database may be stored in a relation
with the following schema:
Students ( sid: string, name: string, login: string, age: integer, gpa: real)
● The preceding schema says that each record in the Students relation has five fields, with
field names and types as indicated.
● An example instance of the Students relation appears in Figure.
Entity-Relationship Model
● In this model, both the data and relationship are present in a single structure known as an
object.
● We can store audio, video, images, etc in the database which was not possible in the
relational model (although you can store audio and video in relational database, it is
advised not to store in the relational database).
● In this model, two are more objects are connected through links. We use this link to relate
one object to other objects.
Object-Relational Model
● As the name suggests it is a combination of both the relational model and the object-
oriented model.
● This model was built to fill the gap between object-oriented model and the relational model.
● We can have many advanced features like we can make complex data types according to
our requirements using the existing data types.
● The problem with this model is that this can get complex and difficult to handle. So, proper
understanding of this model is required.
Hierarchical Model
● Hierarchical Model was the first DBMS model.
● The hierarchy starts from the root which has root data and then it expands in the form of a
tree adding child node to the parent node.
● This model easily represents some of the real-world relationships like food recipes,
sitemap of a website etc.
● Example: We can represent the relationship between the shoes present on a shopping
website in the following way:
Network Model
● This model is an extension of the hierarchical model.
● This model is the same as the hierarchical model; the only difference is that a record can
have more than one parent.
● It replaces the hierarchical tree with a graph.
● Example: In the example below we can see that node student has two parents i.e. CSE
Department and Library. This was earlier not possible in the hierarchical model.
Logical level: describes data stored in database, and the relationships among the data.
View level: application programs hide details of data types. Views can also hide information
(such as an employee’s salary) for security purposes.
DATA INDEPENDENCE
The ability to modify the schema in one level without affecting the schema in next higher level is
called data independence.
• Logical data independence: The ability to modify the logical schema without affecting
the schema in next higher level (external schema.)
• Physical Data Independence – the ability to modify the physical schema without
changing the logical schema
STRUCTURE OF DBMS
● A database system is partitioned into modules that deal with each of the responsibilities of
the overall system.
● The functional components of a database system can be broadly divided into the storage
manager and the query processor components.
● The storage manager is important because databases typically require a large amount of
storage space.
● The query processor is important because it helps the database system to simplify and
facilitate access to data.
● It is the job of the database system to translate updates and queries written in a
nonprocedural language, at the logical level, into an efficient sequence of operations at the
physical level.
1. Query Processor:
It interprets the requests (queries) received from end user via an application program into
instructions. It also executes the user request which is received from the DML compiler.
● DML Compiler –
It processes the DML statements into low level instruction (machine language), so
that they can be executed.
● DDL Interpreter –
It processes the DDL statements into a set of table containing meta data (data
about data).
● Embedded DML Pre-compiler –
It processes DML statements embedded in an application program into procedural
calls.
● Query Optimizer –
It executes the instruction generated by DML Compiler.
2. Storage Manager :
● Storage Manager is a program that provides an interface between the data stored in the
database and the queries received.
● It is also known as Database Control System.
● It maintains the consistency and integrity of the database by applying the constraints and
executes the DCL statements.
● It is responsible for updating, storing, deleting, and retrieving data in the database.
● Authorization Manager –
It ensures role-based access control, i.e,. checks whether the particular person is privileged to
perform the requested operation or not.
● Integrity Manager –
It checks the integrity constraints when the database is modified.
● Transaction Manager –
It controls concurrent access by performing the operations in a scheduled way that it receives
the transaction. Thus, it ensures that the database remains in the consistent state before and
after the execution of a transaction.
● File Manager –
It manages the file space and the data structure used to represent information in the database.
● Buffer Manager –
It is responsible for cache memory and the transfer of data between the secondary storage
and main memory.
3. Disk Storage:
It contains the following components –
● Data Files –
It stores the data.
● Data Dictionary –
It contains the information about the structure of any database object. It is the repository of
information that governs the metadata.
● Indices –
It provides faster retrieval of data item.
• It is responsible for the administration of all the three levels of the database.
DBA is responsible for:
• Define Security
2. Database Designers:
• Database designers design the appropriate structure for the database, where we share
data.
3. System Analyst:
• System analyst analyses the requirements of end users, especially naïve and parametric
end users.
4. Application Programmers:
• Application programmers are computer professionals, who write application programs.
6. Sophisticated Users:
• Sophisticated users can be engineers, scientists, business analyst, who are familiar with
the database. These users interact with the database but they do not write programs
The entity-relationship (ER) data model allows us to describe the data involved in a real-world
enterprise in terms of objects and their relationships and is widely used to develop an initial
database design.
It provides useful concepts that allow us to move front an informal description of what users want
from their database to a more detailed, precise description that can be implemented in a DBMS.
The database design process can be divided into six steps. The ER model is most relevant to the
first three steps.
Beyond ER Design
4. Schema Refinement: The fourth step ill database design is to analyze the collection of
relations in our relational database schema to identify potential problems, and to refine it.
5. Physical Database Design: In this step, we consider typical expected workloads that our
database must support and further refine the database design to ensure that it meets desired
performance criteria.
6. Application and Security Design: Any software project that involves a DBMS must
consider aspects of the application that go beyond the database itself.
In this database model, relationships are created by dividing object of interest into entity and its
characteristics into attributes.
As we described in the tutorial Database models, Entity-relationship model is a model used for
design and representation of relationships between data.
The main data objects are termed as Entities, with their details defined as attributes, some of
these attributes are important and are used to identify the entity, and different entities are related
using relationships.
● An entity set is a set of entities of the same type that share the same properties.
● Example: set of all persons, companies, trees, holidays
ATTRIBUTES
Example:
An attribute can be of many types, here are different types of attributes defined in ER database
model:
1. Simple attribute: The attributes with values that are atomic and cannot be broken down
further are simple attributes. For example, student's age.
2. Composite attribute: A composite attribute is made up of more than one simple attribute.
For example, student's address will contain, house no., street name, pin code etc.
3. Derived attribute: These are the attributes which are not present in the whole database
management system, but are derived using other attributes. For example, average age of
students in a class.
Example: age, and its value is derived from the stored attribute Date of Birth.
Example1: City
Example2: Customer id
● Example1: A customer can have multiple phone numbers, email id's etc
● Example2: A person may have several college degrees
EXAMPLE:
Relationship
• Named set of all similar relationships with the same attributes and relating to the same
entity types
• Relationship is represented with DIAMOND
teaches
• Relationships relate entities within the entity sets involved in the relationship type to each
other.
Example:
• Does every person own a cat? Does every cat have an owner?
ER – Relationships
Mapping Cardinality
Types of Relationships
We express cardinality constraints by drawing either a directed line (->), signifying “one,” or
Many to many
an undirected line (—), signifying “many,” between the relationship set and the entity set.
1. Binary Relationship
2. Recursive Relationship
3. Ternary Relationship
Integrity Constraints
1. Domain Integrity
2. Entity Integrity Constraint
3. Referential Integrity Constraint
4. Key Constraints
1. Domain Integrity-
Domain integrity means the definition of a valid set of values for an attribute. You define data
type, length or size, is null value allowed, is the value unique or not for an attribute, the default
value, the range (values in between) and/or specific values for the attribute.
This rule states that in any database relation value of attribute of a primary key can't be null.
Ex- Consider a relation "STUDENT" Where "Stu_id" is a primary key and it must not contain any
null value whereas other attributes may contain null value e.g "Branch" in the following relation
contains one null value.
11255324 Ajay ME
1. You can't delete a record from a primary table if matching records exist in a related table.
2. You can't change a primary key value in the primary table if that record has related records.
3. You can't enter a value in the foreign key field of the related table that doesn't exist in the
primary key of the primary table.
4. However, you can enter a Null value in the foreign key, specifying that the records are
unrelated.
EXAMPLE-
Consider 2 relations "stu" and "stu_1" Where "Stu_id " is the primary key in the "stu" relation and
foreign key in the "stu_1" relation.
EXAMPLE-
Consider 2 relations "stu" and "stu_1" Where "Stu_id " is the primary key in the "stu" relation and
foreign key in the "stu_1" relation.
Relation "stu"
11255324 Ajay ME
Examples
Rule 1. You can't delete any of the rows in the”stu” relation that are visible since all the”stu” are
in use in the “stu_1” relation.
Rule 2. You can't change any of the”Stu_id” in the “stu” relation since all the “Stu_id” are in use
in the”stu_1” relation.
Rule 3. The values that you can enter in the” Stu_id” field in the “stu_1” relation must be in the”
Stu_id” field in the “stu” relation.
Rule 4. You can enter a null value in the "stu_1" relation if the records are unrelated.
4. Key Constraints-
A Key Constraint is a statement that a certain minimal subset of the fields of a relation is a unique
identifier for a tuple. The types of key constraints-
2. Unique Constraints
A unique column constraint in a table is similar to a primary key in that the value in that column
for every row of data in the table must have a unique value. Although a primary key constraint is
placed on one column, you can place a unique constraint on another column even though it is not
actually for use as the primary key.
The Strong Entity is the one whose existence does not depend on the existence of any other entity
in a schema. It is denoted by a single rectangle. A strong entity always has the primary key in
the set of attributes that describes the strong entity. It indicates that each entity in a strong entity
set can be uniquely identified.
Set of similar types of strong entities together forms the Strong Entity Set. A strong entity holds
the relationship with the weak entity via an Identifying Relationship, which is denoted by double
diamond in the ER diagram. On the other hands, the relationship between two strong entities is
denoted by a single diamond and it is simply called as a relationship.
Let us understand this concept with the help of an example; a customer borrows a loan. Here we
have two entities first a customer entity, and second a loan entity.
A Weak entity is the one that depends on its owner entity i.e. a strong entity for its existence. A
weak entity is denoted by the double rectangle. Weak entities do not have the primary key
instead it has a partial key that uniquely discriminates the weak entities. The primary key of a
weak entity is a composite key formed from the primary key of the strong entity and partial
key of the weak entity.
The collection of similar weak entities is called Weak Entity Set. The relationship between a weak
entity and a strong entity is always denoted with an Identifying Relationship i.e. double
diamond.
Partial Participation
Partial Participation is when each entity in the entity set may not occur in at least one
relationship in that relationship set. For instance, If a company policy states that employee
(manager) must manage a department, However every employee may not manage a
department, so the participation of EMPLOYEE in the MANAGES relationship type is
partial, meaning that some or part of the set of employee entities are related to some
department entity via MANAGES, but not necessarily all.
Note: Partial Participation is represented by single line connecting entities in relationship.
A relationship is an association between several entities.
A relationship set is a set of relationships of the same type.
Formally it is a mathematical relation on ( n>2) (possibly non-distinct) sets. If (E1,E2,....En
) are entity sets,
then a relationship set R is a subset of {(e1,e2,.....en) | e1€ E1 , e2€ E2 ...... en€ En }
where (e1,e2,.....en) is a relationship.
ADDITIONAL FEATURES OF THE ER MODEL
Aggregation
• Used when we have to model a relationship involving (entity sets and) a relationship set.
Aggregation allows us to treat a relationship set as an entity set for purposes of participation in
(other) relationships.
• Works_In4 does not allow an employee to work in a department for two or more periods.
• Similar to the problem of wanting to record several addresses for an employee:
We want to record several values of the descriptive attributes for each instance
of this relationship. Accomplished by introducing new entity set, Duration.
• First ER diagram OK if a manager gets a separate discretionary budget for each dept.
• What if a manager gets a discretionary budget that covers all managed depts?
• If each policy is owned by just 1 employee, and each dependent is tied to the covering
policy, first diagram is inaccurate.
• Previous example illustrated a case when two binary relationships were better than one
ternary relationship.
• An example in the other direction: a ternary relation Contracts relates entity sets Parts,
Departments and Suppliers, and has descriptive attribute qty.
– S “can-supply” P, D“needs” P, and D“deals- with” S does not imply that D has
agreed to buy P from S.
• The choice may also be guided by certain integrity constraints that we want to express.
● We have thus far concentrated on the constructs available in the ER model for describing
various application concepts and relationships.
● The process of conceptual design consists of more than just describing small fragments of
the application in terms of ER diagrams.
● For a large enterprise, the design may require the efforts of more than one designer and
span data and application code used by a number of user groups.
● Using a high-level, semantic data model, such as ER diagrams, for conceptual design in
such an environment offers the additional advantage that the high-level design can be
diagrammatically represented and easily understood by the many people who must
provide input to the design process.
● An important aspect of the design process is the methodology used to structure the
development of the overall design and ensure that the design takes into account all user
requirements and is consistent.
● The usual approach is that the requirements of various user groups are considered, any
conflicting requirements are somehow resolved, and a single set of global requirements is
generated at the end of the requirements analysis phase.
● Generating a single set of global requirements is a difficult task, but it allows the
conceptual design phase to proceed with the development of a logical schema that spans
all the data and applications throughout the enterprise.
● An alternative approach is to develop separate conceptual schema.'-l for different user
groups and then integrate these conceptual schemas.
● To integrate multiple conceptual schemas, we must establish correspondences between
entities, relationships, and attributes, and we must resolve numerous kinds of conflicts
(e.g., naming conflicts, domain mismatches, and differences in measurement units).
● This task is difficult in its own right.
● In some situations, schema integration cannot be avoided; for example, when one
organization merges with another, existing databases may have to be integrated.
● Schema integration is also increasing in importance as users demand access to
heterogeneous data sources, often maintained by different organizations.
SQL commands
SQL commands are divided into four subgroups, DDL, DML, DCL, and TCL.
DDL
DDL is short name of Data Definition Language, which deals with database schemas and
descriptions, of how the data should reside in the database.
● CREATE - to create a database and its objects like (table, index, views, store procedure,
function, and triggers)
● TRUNCATE - remove all records from a table, including all spaces allocated for the
records are removed
DML:
DML is short name of Data Manipulation Language which deals with data manipulation and
includes most common SQL statements such SELECT, INSERT, UPDATE, DELETE, etc., and
it is used to store, modify, retrieve, delete and update data in a database.
DCL:
DCL is short name of Data Control Language which includes commands such as GRANT and
mostly concerned with rights, permissions and other controls of the database system.
● REVOKE - withdraw users access privileges given by using the GRANT command
TCL:
TCL is short name of Transaction Control Language which deals with a transaction within a
database.