0% found this document useful (0 votes)
4 views

DBMS Unit-1 (1)

The document provides an overview of Database Management Systems (DBMS), detailing its definition, significance, and various applications across sectors such as business, science, education, and government. It explains the architecture of DBMS, including external, conceptual, and internal levels, as well as the importance of data independence and mappings between these levels. Additionally, it outlines the roles of different types of database users, including end users, application programmers, and database administrators.

Uploaded by

Moon Knight
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

DBMS Unit-1 (1)

The document provides an overview of Database Management Systems (DBMS), detailing its definition, significance, and various applications across sectors such as business, science, education, and government. It explains the architecture of DBMS, including external, conceptual, and internal levels, as well as the importance of data independence and mappings between these levels. Additionally, it outlines the roles of different types of database users, including end users, application programmers, and database administrators.

Uploaded by

Moon Knight
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Unit-1

Introductory concepts of DBMS

Prepared By:
Dr. Aayushi Chaudhari,
Assistant Professor, CE, CSPIT,
CHARUSAT

3 February 2025| U & P U. Patel Department of Computer Engineering 1


Agenda
1. Introduction to Database Management Systems (DBMS)
2. Applications of DBMS
3. Purpose of a Database
4. Understanding Data Independence
5. Database System Architecture
6. Internal Level Architecture
7. Conceptual Level Architecture
8. External Level Architecture
9. Database Mappings
10. Types of Database Users
11. Role of Database Administrator (DBA)

3 February 2025| U & P U. Patel Department of Computer Engineering 2


Introduction to Database Management Systems (DBMS)
• Definition of DBMS: A DBMS is a software system that facilitates the creation, retrieval,
updating, and management of data in databases. It acts as an intermediary between users
and the database.
• Significance of DBMS: DBMS enhances data consistency, integrity, and security, making
it crucial for managing large volumes of data efficiently.
• Purpose of DBMS: The primary purposes include efficient data management, provision of
easy data access, reduction of redundancy, and ensuring data integrity.

3 February 2025| U & P U. Patel Department of Computer Engineering 3


Applications of DBMS
• Business Applications: Incorporated across industries to manage customer data,
track inventory, streamline operations, enhance reporting, and drive strategic
business decisions.
• Scientific Applications: Utilized in research environments for managing vast
amounts of experimental data, simulations, and tracking findings across multiple
studies.
• Educational Institutions: Adopted for managing student enrollment, courses,
grades, and administrative data to improve institutional effectiveness and student
outcomes.
• Government Applications: Employed in public sector databases for managing
citizen records, public services, and resource allocation, optimizing operational
efficiency.

3 February 2025| U & P U. Patel Department of Computer Engineering 4


Purpose of DBMS
• Understanding the purpose of a database is crucial for maximizing its potential. Primarily,
databases serve as repositories for extensive data storage, accommodating both
structured and unstructured forms.
• The ease of data retrieval allows users to quickly access necessary information,
enhancing operational efficacy.
• Furthermore, the dynamic nature of databases enables ongoing data manipulation,
supporting the ever-changing requirements of organizations.
• Not to be overlooked is the critical aspect of data integrity, which ensures that
information remains accurate and secure.
• Finally, robust backup and recovery mechanisms are vital for protecting data against
loss and ensuring business continuity.
3 February 2025| U & P U. Patel Department of Computer Engineering 5
Data Independence
• Data independence is a feature of database management systems (DBMS) that allows users
to change the structure or storage of data without affecting the applications that use it.
• This means that the way data is stored and accessed is separate from how it is used.
• The benefits of such independence are manifold; it leads to reduced maintenance efforts,
enhances flexibility, and allows for the seamless introduction of upgrades and
improvements.
• Hence, data independence underpins the structural integrity and robustness of
databases, facilitating efficient interactions between users and data.

3 February 2025| U & P U. Patel Department of Computer Engineering 6


Types of Data Independence
There are two types of data independence:
Physical data independence: Allows users to change the physical structure of the
database, such as storage devices, indexing strategies, or data compression methods
Logical data independence: Allows users to change the logical structure of the database
without affecting the other layers of the database.

3 February 2025| U & P U. Patel Department of Computer Engineering 7


Database System Architecture
• A Database stores a lot of critical information to access data quickly and securely.
• Hence it is important to select the correct architecture for efficient data management.
• DBMS Architecture helps users to get their requests done while connecting to the
database.
• We choose database architecture depending on several factors like the size of the
database, number of users, and relationships between the users.
• There are two types of database models that we generally use, logical model and physical
model.
• This architecture dictates how data is stored, organized, and retrieved, playing a
crucial role in the efficiency and effectiveness of data management.

3 February 2025| U & P U. Patel Department of Computer Engineering 8


DBMS Architechture

3 February 2025| U & P U. Patel Department of Computer Engineering 9


External level
• It is also called view level. The reason this level is called “view” is because several users
can view their desired data from this level which is internally fetched from database with
the help of conceptual and internal level mapping.
• The user doesn’t need to know the database schema details such as data structure, table
definition etc. user is only concerned about data which is what returned back to the view
level after it has been fetched from database (present at the internal level).
• External level is the “top level” of the Three Level DBMS Architecture.

3 February 2025| U & P U. Patel Department of Computer Engineering 10


Conceptual level
• It is also called logical level. The whole design of the database such as relationship among
data, schema of data etc. are described in this level.
• Database constraints and security are also implemented in this level of architecture. This
level is maintained by DBA (database administrator).

Internal level
• This level is also known as physical level.
• This level describes how the data is actually stored in the storage devices. This level is also
responsible for allocating space to the data. This is the lowest level of the architecture.
• Includes the physical storage structures like file organization, indexing, and access paths.
3 February 2025| U & P U. Patel Department of Computer Engineering 11
Database Mappings
• Mappings are processes that connect different levels of database architecture to ensure
seamless data transformation, representation, and access. These mappings help synchronize
the way data is stored, manipulated, and presented across various layers.
Importance of Mappings
Consistency: Mappings ensure that data remains coherent and consistent across the internal,
conceptual, and external levels.
Data Operations: They facilitate seamless data operations, making it easier to handle changes
at one level while maintaining the integrity of other levels.
Reduced Discrepancy: By maintaining a uniform representation, mappings eliminate
discrepancies between different schema levels or applications.

3 February 2025| U & P U. Patel Department of Computer Engineering 12


Types of Mappings
Internal-to-Conceptual Mappings:
Connects the internal schema (physical storage) with the conceptual schema (logical structure).
Helps translate changes in the physical storage into the logical view for users.
Example: Suppose a table is split into two smaller tables at the internal level for performance
optimization. Internal-to-conceptual mapping ensures the conceptual schema still shows it as one
unified table to the user.
Conceptual-to-External Mappings:
Links the conceptual schema to the external schema (user's view of the data).
Ensures that any changes in the conceptual schema are reflected in the external views.
Example: A user view (external level) shows employee data in a specific format (e.g., Employee
Name and Salary). If a new attribute (e.g., Department) is added to the conceptual schema, this
mapping ensures that the external view can optionally include or exclude it as per user
requirements.

3 February 2025| U & P U. Patel Department of Computer Engineering 13


Example of mapping
• Internal Level Change: The database administrator decides to partition the Employee table
based on departments to optimize query performance.
• Internal-to-Conceptual Mapping: Despite the partitioning at the internal level, the
conceptual schema continues to represent Employees as a single table, maintaining the
logical view.
• Conceptual-to-External Mapping: A user query requesting employee details still works
seamlessly, retrieving data as if there was no partitioning. This ensures that users are not
affected by internal changes.

3 February 2025| U & P U. Patel Department of Computer Engineering 14


Types of database users
• End Users: Individuals or groups who directly interact with the database to access, manipulate, and
analyze data according to their specific needs. Use applications or query interfaces to retrieve or
update data.
- E.g. A financial analyst retrieving quarterly revenue data for analysis.
• Application Programmers: Developers who create applications that interface with the database,
implementing the necessary queries and business logic to serve end user needs. Bridge the gap
between the database and end users by creating user-friendly interfaces and functionalities.
- E.g. Designing a payroll system that calculates salaries based on employee attendance data.
• Database Administrators: Responsible for managing the database, overseeing operations,
implementing security measures, and ensuring data integrity and performance. Manage database
operations, configure security policies, back up data, and optimize database performance.
- E.g. Performing regular backups to prevent data loss.

3 February 2025| U & P U. Patel Department of Computer Engineering 15


Role of database administrators
• Responsibilities: DBAs are tasked with installing and configuring DBMS software,
monitoring performance, troubleshooting issues, and conducting routine maintenance.
• Database Design: Crafting the database schema, defining relationships, and optimizing the
structure to ensure efficiency and scalability.
• Security Management: Implementing security measures to protect data from unauthorized
access and ensuring compliance with data protection regulations.
• Performance Tuning: Analyzing database performance metrics to optimize queries, indexing
strategies, and overall system responses.

3 February 2025| U & P U. Patel Department of Computer Engineering 16


Thank you

3 February 2025| U & P U. Patel Department of Computer Engineering 17

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy