You are on page 1of 4

Overcoming the Limitations of File Processing The need for three level architecture Keys ACID Properties in DBMS

Eliminating data redundancy. With the database approach to data The objective of the three-level architecture is to separate each user’s Keys play an important role in the relational database. DBMS is the management of data that should remain integrated when
management, data need only be stored once. view of the database from the way the database is physically It is used to uniquely identify any record or row of data from the table. It any changes are done in it. It is because if the integrity of the data is
Ease of maintenance. Because each data element is stored only once, represented. is also used to establish and identify relationships between tables. affected, whole data will get disturbed and corrupted. Therefore, to
any additions, deletions, or changes to the database are accomplished • Support of multiple user views: Each user is able to access the same For example: In Student table, ID is used as a key because it is unique for maintain the integrity of the data, there are four properties described in
easily. data, but have a different customized view of the data. Each user should each student. In PERSON table, passport_number, license_number, SSN the database management system, which are known as
Reduced storage costs. ... be able to change the way he or she views the data and this change are keys since they are unique for each person. the ACID properties. The ACID properties are meant for the transaction
Data integrity. ... should not affect other users. that goes through a different group of tasks, and there we come to see
Data independence • Insulation between user programs and data that does not concern the role of the ACID properties.
Privacy them: Users should not directly deal with physical storage details, such ACID Properties
The File Based System as indexing or hashing. The user’s interactions with the database should Atomicity: The term atomicity defines that the data remains atomic. It
File based systems are an early attempt to computerise the manual be independent of storage considerations. means if any operation is performed on the data, either it should be
filing system. For example, a manual file can be set up to hold all the DML Precompiler performed or executed completely or should not be executed at all. It
correspondence relating to a particular matter as a project, product, All the Database Management systems have two basic sets of Languages further means that the operation should not break in between or
task, client or employee. In an organisation there could be many such ─ Data Defini8on Language (DDL) that contains the set of commands execute partially. In the case of executing operations on the transaction,
files which may be labeled and stored. The same could be done at required to define the format of the data that is being stored and Data the operation should be completely executed and not partially.
homes where file relating to bank statements, receipts, tax payments, Manipulation Language (DML) which defines the set of commands that Consistency: The word consistency means that the value should remain
etc., could be maintained. modify, process data to create user definable output. The DML preserved always. In DBMS, the integrity of the data should be
Limitations of File Based System statements can also be written in an application program. The DML maintained, which means if a change in the database is made, it should
The file-based system has certain limitations. The limitations are listed precompiler converts DML statements (such as SELECT…FROM in remain preserved always. In the case of transactions, the integrity of the
as follows: Structured Query Language (SQL) covered in Block 2) embedded in an data is very essential so that the database remains consistent before and
• Separation and isolation of data: When the data is stored in separate application program to normal procedural calls in the host language. The after the transaction. The data should always be correct.
files it becomes difficult to access. It becomes extremely complex when precompiler interacts with the query processor in order to generate the Isolation: The term 'isolation' means separation. In DBMS, Isolation is
the data has to be retrieved from more than two files as a large amount appropriate code. the property of a database where no data should affect the other one
of data has to be searched. DDL Compiler and may occur concurrently. In short, the operation on one database
• Duplication of data: Due to the decentralised approach, the file system The DDL compiler converts the data definition statements (such as Types of key: should begin when the operation on the first database gets complete. It
leads to uncontrolled duplication of data. This is undesirable as the CREATE TABLE …. in SQL) into a set of tables containing metadata tables. means if two operations are being performed on two different
duplication leads to wastage of a lot of storage space. It also costs time These tables contain information concerning the database and are in a databases, they may not affect the value of one another. In the case of
and money to enter the data more than once. For example, the address form that can be used by other components of the DBMS. These tables transactions, when two or more transactions occur simultaneously, the
information of student may have to be duplicated in bus list file data are then stored in a system catalog or data dictionary. consistency should remain maintained. Any changes that occur in any
• Inconsistent Data: The data in a file system can become inconsistent if Database Administrator particular transaction will not be seen by other transactions until the
more than one person modifies the data concurrently, for example, if One of the main reasons for having the database management system is change is not committed in the memory.
any student changes the residence and the change is notified to only to have control of both data and programs accessing that data. The Durability: Durability ensures the permanency of something. In DBMS,
his/her file and not to bus list. Entering wrong data is also another person having such control over the system is called the database the term durability ensures that the data after the successful execution
reason for inconsistencies. administrator (DBA). The DBA administers the three levels of the of the operation becomes permanent in the database. The durability of
• Data dependence: The physical structure and storage of data files and database and defines the global view or conceptual level of the the data should be so perfect that even if the system fails or leads to a
records are defined in the application code. This means that it is database. the DBMS. Changes to any of the three levels due to changes crash, the database still survives. However, if gets lost, it becomes the
extremely difficult to make changes to the existing structure. The in the organisation and/or emerging technology are under the control of responsibility of the recovery manager for ensuring the durability of the
programmer would have to identify all the affected programs, modify the DBA. Mappings between the internal and the conceptual levels, The 1. Primary key database. For committing the values, the COMMIT command must be
them and retest them. This characteristic of the File Based system is user profile can be used by the database system to verify that a It is the first key which is used to identify one and only one instance of used every time we make changes.
called program data dependence particular user can perform a given operation on the database. an entity uniquely. An entity can contain multiple keys as we saw in Generalization
• Fixed Queries: File based systems are very much dependent on • Schema definition: Creation of the original database schema is PERSON table. The key which is most suitable from those lists become a Generalization is like a bottom-up approach in which two or more
application programs. Any query or report needed by the organisation accomplished by writing a set of definitions which are translated by the primary key. entities of lower level combine to form a higher level entity if they have
has to be developed by the application programmer. With time, the type DDL compiler to a set of tables that are permanently stored in the data In the EMPLOYEE table, ID can be primary key since it is unique for each some attributes in common.
and number of queries or reports increases. Producing different types of dictionary. employee. In the EMPLOYEE table, we can even select License_Number In generalization, an entity of a higher level can also combine with the
queries or reports is not possible in File Based Systems. As a result, in • Storage Structure and access method definition: The creation of and Passport_Number as primary key since they are also unique. entities of the lower level to form a further higher level entity.
some organisations the type of queries or reports to be produced is appropriate storage structure and access method is accomplished by For each entity, selection of the primary key is based on requirement Generalization is more like subclass and superclass system, but the only
fixed. No new query or report of the data could be generated. writing a set of definitions which are translated by the data storage and and developers. difference is the approach. Generalization uses the bottom-up approach.
THE LOGICAL DBMS ARCHITECTURE definition language compiler. 2. Candidate key In generalization, entities are combined to form a more generalized
Database Management Systems are very complex, sophisticated • Schema and Physical organisation modification: DBA involves either A candidate key is an attribute or set of an attribute which can uniquely entity, i.e., subclasses are combined to make a superclass.
software applications that provide reliable management of large the modification of the database schema or the description of the identify a tuple. For example, Faculty and Student entities can be generalized and create
amounts of data. To describe general database concepts and the physical storage organisation. These changes, the DDL compiler or the The remaining attributes except for primary key are considered as a a higher level entity Person.
structure and capabilities of a DBMS better, the architecture of a typical data storage and definition language compiler to generate modification candidate key. The candidate keys are as strong as the primary key. Specialization
database management system should be studied. to the appropriate internal system tables For example: In the EMPLOYEE table, id is best suited for the primary Specialization is a top-down approach, and it is opposite to
There are two different ways to look at the architecture of a DBMS: the • Granting of authorisation for data access: DBA allows the granting of key. Rest of the attributes like SSN, Passport_Number, and Generalization. In specialization, one higher level entity can be broken
logical DBMS architecture and the physical DBMS architecture. The different types of authorisation for data access to the various users of License_Number, etc. are considered as a candidate key. down into two lower level entities.
logical architecture deals with the way data is stored and presented to the database. • Integrity constraint specification: These constraints are 3. Super Key Specialization is used to identify the subset of an entity set that shares
users, while the physical architecture is concerned with the software kept in a special system structure, the data dictionary that is consulted Super key is a set of an attribute which can uniquely identify a tuple. some distinguishing characteristics.
components that make up a DBMS. by the database manager prior to any data manipulation. Data Super key is a superset of a candidate key. Normally, the superclass is defined first, the subclass and its related
Three Level Architecture of DBMS or Logical DBMS Dictionary is one of the valuable tools that the DBA uses to carry out For example: In the above EMPLOYEE table, for(EMPLOEE_ID, attributes are defined next, and relationship set are then added.
Architecture data administration. EMPLOYEE_NAME) the name of two employees can be the same, but For example: In an Employee management system, EMPLOYEE entity can
The logical architecture describes how data in the database is perceived Data Dictionary: their EMPLYEE_ID can't be the same. Hence, this combination can also be specialized as TESTER or DEVELOPER based on what role they play in
by users. It is not concerned with how the data is handled and processed A Data Dictionary stores information about the structure of the be a key. the company.
by the DBMS, but only with how it looks. The method of data storage on database. It is seen that when a program becomes somewhat large in The super key would be EMPLOYEE-ID, (EMPLOYEE_ID, EMPLOYEE- Aggregation
the underlying file system is not revealed, and the users can manipulate size, keeping track of all the available names that are used and the NAME), etc. In aggregation, the relation between two entities is treated as a single
the data without worrying about where it is located or how it is actually purpose for which they were used becomes more and more difficult. 4. Foreign key entity. In aggregation, relationship with its corresponding entities is
stored. This results in the database having different levels of abstraction. After a significant time if the same or another programmer has to modify Foreign keys are the column of the table which is used to point to the aggregated into a higher level entity.
The majority of commercial Database Management S ystems available the program, it becomes extremely difficult. The problem becomes even primary key of another table. For example: Center entity offers the Course entity act as a single entity
today are based on the ANSI/SPARC generalised DBMS architecture, as more difficult when the number of data types that an organisation has in In a company, every employee works in a specific department, and in the relationship which is in a relationship with another entity visitor.
proposed by the ANSI/SPARC Study Group on Data Base Management its database increases. employee and department are two different entities. So we can't store In the real world, if a visitor visits a coaching center then he will never
Systems. Hence this is also called as the ANSI/SPARC model. It divides An ideal data dictionary should include everything a DBA wants to know the information of the department in the employee table. That's why we enquiry about the Course only or just about the Center instead he will
the system into three levels of abstraction: the internal or physical level, about the database. link these two tables through the primary key of one table. ask the enquiry about both.
the conceptual level, and the external or view level. The diagram below 1. External, conceptual and internal database descriptions. We add the primary key of the DEPARTMENT table, Department_Id as a
shows the logical architecture for a typical DBMS. 2. Descriptions of entities (record types), attributes (fields), as well as new attribute in the EMPLOYEE table.
crossreferences, origin and meaning of data elements. Now in the EMPLOYEE table, Department_Id is the foreign key, and both
3. Synonyms, authorisation and security codes. the tables are related.
4. Which external schemas are used by which programs, who the users
are, and what their authorisations are.
5. Statistics about database and its usage including number of records,
etc.
Domain Constraint : Dependency Preserving • Locating, storing, modifying, deleting, or adding records in the file
It specifies that each attribute in a relation must contain an atomic value It is an important constraint of the database. require rearranging the file.
only from the corresponding domains. The data types associated with Normal Form Description In the dependency preservation, at least one decomposed table must • This method is too slow to handle applications requiring immediate
commercial RDBMS domains include: satisfy every dependency. updating or responses.
1) Standard numeric data types for integer (such as short- integer, If a relation R is decomposed into relation R1 and R2, then the Indexed (Indexed Sequential)
integer, long integer) 1NF A relation is in 1NF if it contains an atomic value. dependencies of R either must be a part of R1 or R2 or must be derivable File Organisation It organises the file like a large dictionary, i.e., records
2) Real numbers (float, double precision floats) from the combination of functional dependencies of R1 and R2. are stored in order of the key but an index is kept which also permits a
3) Characters For example, suppose there is a relation R (A, B, C, D) with functional type of direct access. The records are stored sequentially by primary key
2NF A relation will be in 2NF if it is in 1NF and all non-key
4) Fixed length strings and variable length strings. dependency set (A->BC). The relational R is decomposed into R1(ABC) values and there is an index built over the primary key field. The retrieval
Thus, domain constraint specifies the condition that we want to put on
attributes are fully functional dependent on the and R2(AD) which is dependency preserving because FD A->BC is a part of a record from a sequential file, on average, requires access to half the
each instance of the relation. So the values that appear in each column primary key. of relation R1(ABC) records in the file, making such inquiries not only inefficient but very
must be drawn from the domain associated with that column. one basic point: “A decomposition into 3NF is lossless and dependency time consuming for large files. To improve the query response time of a
Key Constraint : 3NF A relation will be in 3NF if it is in 2NF and no preserving whereas a decomposition into BCNF is lossless but may or sequential file, a type of indexing technique can be added. An index is a
This constraint states that the key attribute value in each tuple must be may not be dependency preserving.” set of index value, address pairs. Indexing associates a set of objects to a
transition dependency exists.
unique, i.e., no two tuples contain the same value for the key attribute. Lossless Decomposition set of orderable quantities, that are usually smaller in number or their
This is because the value of the primary key is used to identify the tuples If the information is not lost from the relation that is decomposed, then properties. Thus, an index is a mechanism for faster search. Although the
in the relation 4NF A relation will be in 4NF if it is in Boyce Codd normal the decomposition will be lossless. indices and the data blocks are kept together physically, they are
Example 3: If A is the key attribute in the following relation R than A1, A2 form and has no multi-valued dependency. The lossless decomposition guarantees that the join of relations will logically distinct. Let us use the term an index file to describes the
and A3 must be unique result in the same relation as it was decomposed. indexes and let us refer to data files as data records. An index can be
Integrity Constraint : The relation is said to be lossless decomposition if natural joins of all the small enough to be read into the main memory.
There are two types of integrity constraints: 5NF A relation is in 5NF if it is in 4NF and not contains any decomposition give the original relation. Hashed File Organisation
• Entity Integrity Constraint join dependency and joining should be lossless. File Organisation Hashing is the most common form of purely random access to a file or
• Referential Integrity Constraint File Organisation is a way of arranging the records in a file when the file database. It is also used to access columns that do not have an index as
The First Normal Form (1NF) an optimisation technique. Hash functions calculate the address of the
Entity Integrity Constraint : It states that no primary key value can be is stored on the disk. Data files are organized so as to facilitate access to
null. This is because the primary key is used to identify individual tuple in Definition: A relation (table) is in 1NF if records and to ensure their efficient storage. A tradeoff between these page in which the record is to be stored based on one or more fields in
1. There are no duplicate rows or tuples in the relation. the record. The records in a hash file appear randomly distributed across
the relation. So we will not be able to identify the records uniquely two requirements generally exists: if rapid access is required, more
2. Each data value stored in the relation is single-valued the available space. It requires some hashing algorithm and the
containing null values for the primary key attributes. This constraint is storage is required to make it possible. Selection of File Organisations is
specified on one individual relation. 3. Entries in a column (attribute) are of the same kind (type). dependant on two factors as shown below: technique. Hashing Algorithm converts a primary key value into a record
Note: 1) ‘#’ identifies the Primary key of a relation. Please note that in a 1NF relation the order of the tuples (rows) and • Typical DBMS applications need a small subset of the DB at any given address. The most popular form of hashing is division hashing with
In the relation R above, the primary key has null values in the tuples t1 & attributes. The first requirement above means that the relation must time. chained overflow.
t3. NULL value in primary key is not permitted, thus, relation instance is have a key. The key may be single attribute or composite key. It may • When a portion of the data is needed it must be located on disk, Advantages of Hashed file Organisation
an invalid instance. even, possibly, contain all the columns. copied to memory for processing and rewritten to disk if the data was Insertion or search on hash-key is fast. 2.
Example: Relation EMPLOYEE is not in 1NF because of multi-valued Best if equality search is needed on hash-key.
Referential integrity constraint modified.
attribute EMP_PHONE. Disadvantages of Hashed file Organisation
It states that the tuple in one relation that refers to another relation A file of record is likely to be accessed and modified in a variety of ways,
The Second Normal Form (2NF) 1. It is a complex file Organisation method.
must refer to an existing tuple in that relation. This constraint is specified and different ways of arranging the records enable different operations
The relation of Figure 3 is in 1NF, yet it suffers from all anomalies as 2. Search is slow.
on two relations (not necessarily distinct). It uses a concept of foreign over the file to be carried out efficiently. A DBMS supports several file
discussed earlier so we need to define the next normal form. 3. It suffers from disk space overhead.
key and has been dealt with in more detail in the next unit. Organisation techniques. The important task of the DBA is to choose a
Definition: A relation is in 2NF if it is in 1NF and every non-key attribute good Organisation for each file, based on its type of use 4. Unbalanced buckets degrade performance.
Note:1) ‘#’ identifies the Primary key of a relation.
is fully dependent on each candidate key of the relation. 5. Range search is slow.
2) ‘^’ identifies the Foreign key of a relation. Heap File
Some of the points that should be noted here are: Binary Search Tree
Same Table as up but another table is foreign table Heap files (unordered file) Basically these files are unordered files. It is
• A relation having a single attribute key has to be in 2NF. A BST is a data structure that has a property that all the keys that are to
The INSERT Operation: The insert operation allows us to insert a new the simplest and most basic type. These files consist of randomly
• In case of composite key, partial dependency on key that is part of the the left of a node are smaller than the key value of the node and all the
tuple in a relation. four types of constraints can be violated: • Domain ordered records. The records will have no particular order. The
key is not allowed. keys to the right are larger than the key value of the node.
constraint: If the value given to an attribute lies outside the domain of operations we can perform on the records are insert, retrieve and
• 2NF tries to ensure that information in one relation is about one thing A B-Tree as an index has two advantages:
that attribute. • Key constraint: If the value of the key attribute in new delete.
• Non-key attributes are those that are not part of any candidate key. • It is completely balanced
tuple t is the same as in the existing tuple in relation R. • Referential The features of the heap file or the pile file Organisation are:
The Third Normal Form (3NF) • Each node of B-Tree can have a number of keys. Ideal node size would
Integrity constraint: If the value of the foreign key in t refers to a tuple • New records can be inserted in any empty space that can
Definition: A relation is in third normal form, if it is in 2NF and every non- be if it is somewhat equal to the block size of secondary storage.
that doesn’t appear in the referenced relation. accommodate them.
key attribute of the relation is non-transitively dependent on each Inverted File Organisation
The Deletion Operation: Using the delete operation some existing • When old records are deleted, the occupied space becomes empty and
candidate key of the relation. Inverted file organisation is one file organisation where the index
records can be deleted from a relation. To delete some specific records available for any new insertion.
A relation will be in 3NF if it is in 2NF and not contain any transitive structure is most important. In this organisation the basic structure of
from the database a condition is also specified based on which records • If updated records grow; they may need to be relocated (moved) to a
partial dependency.
new empty space. This needs to keep a list of empty space. file records does not matter much. This file organisation is somewhat
can be selected for deletion. 3NF is used to reduce the data duplication. It is also used to achieve the
Advantages of heap files similar to that of multi-list file organisation with the key difference that
The Update Operations: Update operations are used for modifying data integrity. If there is no transitive dependency for non-prime
in multi-list file organisation index points to a list, whereas in inverted
1. This is a simple file Organisation method.
database values. The constraint violations faced by this operation are attributes, then the relation must be in third normal form.
2. Insertion is somehow efficient. file organisation the index itself contains the list. Thus, maintaining the
logically the same as the problem faced by Insertion and Deletion it holds atleast one of the following conditions for every non-trivial
3. Good for bulk-loading data into a table. proper index through proper structures is an important issue in the
Operations. Therefore, we will not discuss this operation in greater detail function dependency X → Y. X is a super key. Y is a prime attribute, i.e.,
4. Best if file scans are common or insertions are frequent. design of inverted file organisation
here. each element of Y is part of some candidate key.
Disadvantages of heap files Please note the following points for the inverted file organisation:
What are entities? Boyce-Codd Normal Form (BCNF) • The index entries are of variable lengths as the number of records with
1. Retrieval requires a linear search and is inefficient.
• An entity is an object of concern used to represent the things in the Definition: A relation is in BCNF, if it is in 3NF and if every determinant is the same key value is changing, thus, maintenance of index is more
2. Deletion can result in unused space/need for reorganisation.
real world, e.g., car, table, book, etc. a candidate key.
Sequential File Organisation complex than that of multi-list file organisation.
• An entity need not be a physical entity, it can also represent a concept • A determinant is the left side of an FD
The most basic way to organise the collection of records in a file is to • The queries that involve Boolean expressions require accesses only for
in real world, e.g., project, loan, etc. • Most relations that are in 3NF are also in BCNF. A 3NF relation is not in
use sequential Organisation. Records of the file are stored in sequence those records that satisfy the query in addition to the block accesses
• It represents a class of things, not any one instance, e.g., ‘STUDENT’ BCNF if all the following conditions apply. needed for the indices. For example, the query about Female, MCA
(a) The candidate keys in the relation are composite keys. by the primary key field values. They are accessible only in the order
entity has instances of ‘Ramesh’ and ‘Mohan’. employees can be solved by the Gender and Qualification index. You just
(b) There is more than one overlapping candidate keys in the relation, stored, i.e., in the primary key order. This kind of file Organisation works
Strong entity set: The entity types containing a key attribute are well for tasks which need to access nearly every record in a file, e.g., need to take intersection of record numbers on the two indices. (Please
called strong entity types or regular entity types. and some attributes in the keys are overlapping and some are not refer to Figure 16). Thus, any complex query requiring Boolean
overlapping. payroll. Let us see the advantages and disadvantages of it. In a
• EXAMPLE: The Student entity has a key attribute RollNo which expression can be handled easily through the help of indices.
(c) There is a FD from the non-overlapping attribute(s) of one candidate sequentially organised file records are written consecutively when the
uniquely identifies it, hence is a strong entity. Normalization
key to non-overlapping attribute(s) of other candidate key. file is created and must be accessed consecutively when the file is later
Weak Entity: used for input Normalization is the process of organizing the data in the database.
Entity types that do not contain any key attribute, and hence cannot be Data Redundancy- Normalization is used to minimize the redundancy from a relation or set
A sequential file maintains the records in the logical sequence of its
identified independently, are called weak entity types. A weak entity can A lot of information is being repeated in the relation. For example, the
primary key values. Sequential files are inefficient for random access, of relations. It is also used to eliminate the undesirable characteristics
be identified uniquely only by considering some of its attributes in information that MCS-014 is named SSAD is repeated, address of Rahul like Insertion, Update and Deletion Anomalies.
however, are suitable for sequential access. A sequential file can be
conjunction with the primary key attributes of another entity, which is is “D-27, Main road, Ranchi” is being repeated in the first three records.
stored on devices like magnetic tape that allow sequential access. Normalization divides the larger table into the smaller table and links
called the identifying owner entity. Generally a partial key is attached to Please find the other duplicate information. So we find that the student them using relationship.
Advantages of Sequential File Organisation
a weak entity type that is used for unique identification of weak entities name, address, course name, instructor name and office number are The normal form is used to reduce redundancy from the database table.
• It is fast and efficient when dealing with large volumes of data that
related to a particular owner entity type. being repeated often, thus, the table has Data Redundancy.
need to be processed periodically (batch system).
• The owner entity set and the weak entity set must participate in one to Disadvantages of sequential File Organisation
many relationship set. This relationship set is called the identifying • Requires that all new transactions be sorted into the proper sequence
relationship set of the weak entity set. for sequential access processing.
• The weak entity set must have total participation in the identifying
relationship.
The Data definition language (DDL) defines a set of commands THE TRANSACTIONS Precedence Graph Log based recovery
used in the creation and modification of schema objects such as tables, A transaction is defined as the unit of work in a database system. A precedence graph, also known as serialization graph or conflict graph, A transaction log is a record in DBMS that keeps track of all the
indexes, views etc. These commands provide the ability to create, alter Database systems that deal with a large number of transactions are also is used for testing Conflict Serializability of a schedule in the condition transactions of a database system that update any data values in the
and drop these objects. These commands are related to the termed as transaction processing systems. Transaction is a unit of data that forms the setting of concurrency control in databases.. database. A log contains the following information about a transaction:
management and administrations of the databases. Before and after processing. The steps of constructing a precedence graph are: • A transaction begin marker
each DDL statement, the current transactions are implicitly committed, Properties of a Transaction 1. Create a node for every transaction in the schedule. • The transaction identification: The transaction id, terminal id or user id
that is changes made by these commands are permanently stored in the A transaction has four basic properties. 2. Find the precedence relationships in conflicting operations. Conflicting etc.
databases These are: • Atomicity • Consistency • Isolation or Independence • operations are (read-write) or (write-read) or (write–write) on the same The operations being performed by the transaction such as update,
ALTER TABLE Command: This command is used for modification of Durability or Permanence data item in two different transactions. But how to find them? 2.1 For a delete, insert.
existing structure of the table in the following situation: Atomicity: It defines a transaction to be a single unit of processing. In transaction Ti which reads an item A, find a transaction Tj that writes A • The data items or objects that are affected by the transaction including
• When a new column is to be added to the table structure. other words either a transaction will be done completely or not at all. In later in the schedule. If such a transaction is found, draw an edge from Ti name of the table, row number and column number.
• When the existing column definition has to be changed, i.e., changing the transaction example 1 & 2 please note that transaction 2 is reading to Tj. • The before or previous values (also called UNDO values) and after or
the width of the data type or the data type itself. and writing more than one data items, the atomicity property requires 2.2 For a transaction Ti which has written an item A, find a transaction Tj changed values (also called REDO values) of the data items that have
• When integrity constraints have to be included or dropped. either operations on both the data item be performed or not at all. later in the schedule that reads A. If such a transaction is found, draw an been updated.
• When a constraint has to be enabled or disabled. Consistency: This property ensures that a complete transaction edge from Ti to Tj. • A pointer to the next transaction log record, if needed.
Syntax execution takes a database from one consistent state to another 2.3 For a transaction Ti which has written an item A, find a transaction Tj • The COMMIT marker of the transaction
ALTER TABLE <Table name > ADD (<column name ><Data type>); consistent state. If a transaction fails even then the database should that writes A later than Ti. If such a transaction is found, draw an edge SECURITY AND INTEGRITY
ALTER TABLE <Table name > Modify (<column name ><Data type>); come back to a consistent state. from Ti to Tj. Database security is the protection of information that is maintained in a
DROP TABLE Command: When an existing object is not required for Isolation or Independence: The isolation property states that the 3. If there is any cycle in the graph, the schedule is not serialisable, database. It deals with ensuring only the “right people” get the right to
further use, it is always better to eliminate it from the database. To updates of a transaction should not be visible till they are committed. otherwise, find the equivalent serial schedule of the transaction by access the “right data”. By right people we mean those people who have
delete the existing object from the database the following command is Isolation guarantees that the progress of other transactions do not affect traversing the transaction nodes starting with the node that has no input the right to access/update the data that they are requesting to
used. Syntax: Drop Table <Table name> the outcome of this transaction. For example, if another transaction that edge. access/update with the database. This should also ensure the
Data manipulation language (DML) defines a set of commands that is a withdrawal transaction which withdraws an amount of Rs. 5000 from Locks confidentiality of the data.
are used to query and modify data within existing schema objects. In this X account is in progress, whether fails or commits, should not affect the Serialisabilty is just a test whether a given interleaved schedule is ok or The term integrity is also applied to data and to the mechanism that
case commit is not implicit that is changes are not permanent till outcome of this transaction. Only the state that has been read by the has a concurrency related problem. However, it does not ensure that the helps to ensu consistency. Integrity refers to the avoidance of accidental
explicitly committed. DML statements consist of SELECT, INSERT, transaction last should determine the outcome of this transaction. interleaved concurrent transactions do not have any concurrency related loss of consistency. Protection of database contents from unauthorised
UPDATE and DELETE statements. Durability: This property necessitates that once a transaction has problem. This can be done by using locks. So let us discuss about what access includes legal and ethical issues, organization policies as well as
Order by clause committed, the changes made by it be never lost because of subsequent the different types of locks are, and then how locking ensures database management policies. To protect database several levels of
• It is used in the last portion of select statement failure. Thus, a transaction is also a basic unit of recovery. The details of serialsability of executing transactions. Types of Locks There are two security measures are maintained:
• By using this rows can be sorted transaction-based recovery are discussed in the next unit. basic types of locks: 1) Physical: The site or sites containing the computer system must be
• By default it takes ascending order CONCURRENT TRANSACTIONS • Binary lock: This locking mechanism has two states for to a data item: physic secured against illegal entry of unauthorised person
• DESC: is used for sorting in descending order two transactions are contending for the same data item and at least one locked or unlocked 2) Human: An Authorisation is given to a user to reduce the chance of
• Sorting by column which is not in select list is possible of the concurrent transactions wishes to update a data value in the • Multiple-mode locks: In this locking type each data item can be in any information leakage and unwanted manipulations.
• Sorting by column Alias database. three states read locked or shared locked, write locked or exclusive 3) Operating System: Even though foolproof security secure database
Example 16: SELECT EMPNO, ENAME, SAL*12 “ANNUAL” Problems of Concurrent Transactions locked or unlocked. systems, weakness in the operating system security may serve as a
FROM EMP The problem occurs when two different database transactions perform Two Phase Locking (2PL) means of unauthorised access to the database. Netwo or network,
ORDER BY ANNUAL; the read/write operations on the same database items in an interleaved The two-phase locking protocol consists of two phases: software level security within the network software is an important
Group By clauses manner (i.e., concurrent execution) that makes the values of the items Phase 1: The lock acquisition phase: If a transaction T wants to read an issue.
•It is used to group database tuples on the basis of certain common incorrect hence making the database inconsistent. object, it needs to obtain the S (shared) lock. If T wants to modify an 4)Database system: The data items in a database need a fine level of
attribute value such as employees of a department. Dirty Read Problems (W-R Conflict) object, it needs to obtain X (exclusive) lock. No conflicting locks are access control. For example, a user may only be allowed to read a data
• WHERE clause still can be used, if needed. The dirty read problem occurs when one transaction updates an item of granted to a transaction. New locks on items can be acquired but no lock item and is allowed to issue queries but would not be allowed to
Find department number and Number of Employees working in that the database, and somehow the transaction fails, and before the data can be released till all the locks required by the transaction are obtained. deliberately modify the data
department. gets rollback, the updated database item is accessed by another Phase 2: Lock Release Phase: The existing locks can be released in any • Replication: It is defined as a copy of a relation. Each replica is stored
SELECT DEPTNO, COUNT(EMPNO) transaction. There comes the Read-Write Conflict between both order but no new lock can be acquired after a lock has been released. at a different site. The alternative to replication is to store only one copy
FROM EMP transactions. The locks are held only till they are required. Normally the locks are of a relation which is not recommended in distributed databases.
GROUP BY DEPTNO; Unrepeatable Read Problem (W-R Conflict) obtained by the DBMS. Any legal schedule of transactions that follows 2 • Fragmentation: It is defined as partitioning of a relation into several
Views phase locking protocol is guaranteed to be serialisable. The two phase fragments. Each fragment can be stored at a different site.
Also known as Inconsistent Retrievals Problem that occurs when in a
A view is like a window through which data from tables can be viewed or transaction, two different values are read for the same database item. locking protocol has been proved for it correctness. However, the proof Data Replication
changed. The table on which a view is based is called Base table. The of this protocol is beyond the scope of this Unit. You can refer to further “If a relation R has its copies stored at two or more sites, then it is
B+ Tree
view is stored as a SELECT statement in the data dictionary. When the readings for more details on this protocol. considered replicated”. But why do we replicate a relation? There are
The B+ tree is a balanced binary search tree. It follows a multi-level index
user wants to retrieve data, using view. Then the following steps are There are two types of 2PL: various advantages and disadvantages of replication of relation
format.
followed. (1) The Basic 2PL • Availability: A site containing the copy of a replicated relation fails,
In the B+ tree, leaf nodes denote actual data pointers. B+ tree ensures
1) View definition is retrieved from data dictionary table. For example, (2) Strict 2PL even then the relation may be found in another site. Thus, the system
that all leaf nodes remain at the same height.
the view definitions in oracle are to be retrieved from table name USER- The basic 2PL allows release of lock at any time after all the locks have may continue to process at least the queries involving just read
In the B+ tree, the leaf nodes are linked using a link list. Therefore, a B+
VIEWS. been acquired. For example, we can release the locks in schedule of operation despite the failure of one site
tree can support random access as well as sequential access.
2) Checks access privileges for the view base table. Figure 8, after we have Read the values of Y and Z in transaction 11, even • Increased parallelism: Since the replicated date has many copies a
Structure of B+ Tree before the display of the sum. This will enhance the concurrency level. query can be answered from the least loaded site or can be distributed.
3) Converts the view query into an equivalent operation on the In the B+ tree, every leaf node is at equal distance from the root node.
underlying base table Deadlock in DBMS Also, with more replicas you have greater chances that the needed data
The B+ tree is of the order n where n is fixed for every B+ tree.
Advantages: A deadlock is a condition where two or more transactions are waiting is found on the site where the transaction is executing. Hence, data
It contains an internal node and leaf node.
• It restricts data access. indefinitely for one another to give up locks. Deadlock is said to be one replication can minimise movement of data between sites.
Hashing • Increased overheads on update: On the disadvantage side, it will
• It makes complex queries look easy. of the most feared complications in DBMS as no task ever gets finished
In a huge database structure, it is very inefficient to search all the index require the system to ensure that all replicas of a relation are consistent.
• It allows data independence. and is in waiting state forever.
values and reach the desired data. Hashing technique is used to calculate This implies that all the replicas of the relation need to be updated at the
• It presents different views of the same data. Deadlock Prevention
the direct location of a data record on the disk without using index same time, resulting in increased overheads
Serialisable Schedules Deadlock prevention method is suitable for a large database. If the
structure.
If the operations of two transactions conflict with each other, how to resources are allocated in such a way that deadlock never occurs, then Advantages of Client Server Computing
In this technique, data is stored at the data blocks whose address is
determine that no concurrency related problems have occurred? For the deadlock can be prevented. • They provide low cost and user-friendly environment • They offer
generated by using the hashing function. The memory location where
this, serialisability theory has been developed. Serialisability theory The Database management system analyzes the operations of the expandability that ensures that the performance degradation is not so
these records are stored is known as data bucket or data blocks.
attempts to determine the correctness of the schedules. transaction whether they can create a deadlock situation or not. If they much with increased load. • They allow connectivity with the
In this, a hash function can choose any of the column value to generate
The rule of this theory is: “A schedule S of n transactions is serialisable if do, then the DBMS never allowed that transaction to be executed. heterogeneous machines deals with real time data feeders like ATMs,
the address. Most of the time, the hash function uses the primary key to
it is equivalent to some serial schedule of the same ‘n’ transactions”. There exist two such schemes. These are: Numerical machines. • They allow enforcement of database
generate the address of the data block. A hash function is a simple
“Wait-die” scheme: management activities including security, performance, backup, integrity
mathematical function to any complex mathematical function. We can
The scheme is based on non-preventive technique. It is based on a to be a part of the database server machine. Thus, avoiding the
even consider the primary key itself as the address of the data block.
simple rule: requirement to write a large number of redundant piece of code dealing
That means each row whose address will be the same as a primary key
If Ti requests a database resource that is held by Tj with database field validation and referential integrity. • One major
stored in the data block.
then if Ti has a smaller timestamp than that of Tj advantage of the client/server model is that by allowing multiple users
Types of Hashing:
it is allowed to wait; else Ti aborts. to simultaneously access the same application data, updates from one
Static Hashing
“Wound-wait” sch based on a simple rule: then computer are instantly made available to all computers that had access
Dynamic Hashing
if Ti has a larger timestamp (Ti is younger) than that of Tj to the server.
then if Ti has a larger timestamp (Ti is younger) than that of Tj
it is allowed to wait;
else Tj is wounded up by Ti.
Data Fragmentation Disadvantages of Data Distribution
“Fragmentation involves decomposing the data in relation to non- • Higher Software development cost: Distributed database systems are
overlapping component relations”. complex to implement and, thus, more costly. Increased complexity
Use of partial data by applications: In general, applications work with implies that we can expect the procurement and maintenance costs for a
views rather than entire relations. Therefore, it may be more DDBMS to be higher than those for a centralised DBMS.
appropriate to work with subsets of relations rather than entire data. •Greater potential for bugs: Since the sites of a distributed system
Increases efficiency: Data is stored close to most frequently used site, operate concurrently, it is more difficult to ensure the correctness of
thus retrieval would be faster. Also, data that is not needed by local algorithms. The art of constructing distributed algorithms is an active
applications is not stored, thus the size of data to be looked into is and important area of research. • Increased processing overhead: The
smaller. exchange of messages and the additional computation required to
Parallelism of transaction execution: A transaction can be divided into achieve coordination among the sites is an overhead that does not arise
several sub-queries that can operate on fragments in parallel. This in centralised systems. •Complexity: A distributed DBMS that is reliable,
increases the degree of concurrency in the system, thus allowing available and secure is inherently more complex than a centralised
transactions to execute efficiently. Security: Data not required by local DBMS. Replication of data discussed in the next section, also adds to
applications is not stored at the site, thus no unnecessary security complexity of the distributed DBMS. However, adequate data replication
violations may exist. is necessary to have availability, reliability, and performance. • Security:
2-Tier Client/Server In a centralised system, access to the data can be easily controlled.
Two-tier client/server provides the user system interface usually on the However, in a distributed DBMS not only does access to replicated data
desktop environment to its users. The database management services have to be controlled in multiple locations, but also the network needs
are usually on the server that is a more powerful machine and services to be secured. Networks over a period have become more secure, still
many clients. Thus, 2-Tier client-server architecture splits the processing there is a long way to go. • Lack of standards and experience: The lack of
between the user system interface environment and the database standards has significantly limited the potential of distributed DBMSs.
management server environment. The database management server Also, there are no tools or methodologies to help users convert a
also provides stored procedures and triggers. There are a number of centralised DBMS into a distributed DBMS. • General Integrity control
software vendors that provide tools to simplify the development of more difficult: Integrity is usually expressed in terms of constraints or
applications for the two-tier client/server architecture the rules that must be followed by database values. In a distributed
3-tier architecture DBMS, the communication and processing costs that are required to
The three-tier architecture emerged to overcome the limitations of the enforce integrity constraints may be very high as the data is stored at
two tier architecture (also referred to as the multi-tier architecture). In various sites. However, with better algorithms we can reduce such costs.
the three-tier architecture, a middle tier was added between the user • Purpose: General-purpose distributed DBMSs have not been widely
system interface client environment and the database management accepted. We do not yet have the same level of experience in industry as
server environment. The middle tier may consist of transaction we have with centralised DBMSs. • Database design more complex:
processing monitors, message servers, or application servers. Besides the normal difficulties of designing a centralised database, the
Advantages of Data Distribution design of a distributed database has to take account of fragmentation of
Data sharing and Distributed Control The geographical distribution of an data, allocation of fragments to specific sites, and data replication
organization can be reflected in the distribution of the data; if a number AUTHORISATION
of different sites are connected to each other, then a user at one site Authorisation is the culmination of the administrative policies of the
may be able to access data that is available at another site. organisation. As the name specifies, authorisation is a set of rules that
Reflects organisational structure Many organizations are distributed can be used to determine which ser has what type of access to which
over several locations. If an organisation has many offices in different portion of the database. . The following forms of deletion. But data items
cities, databases used in such an application are distributed over these like primary-key attributes may not be modified. u authorisation are
locations. permitted on database items: 1) READ: it allows reading of data object,
Improved Reliability In a centralised DBMS, a server failure terminates but not modification, deletion or insertion of data object. 2) INSERT:
the operations of the DBMS. However, a failure at one site of a DDBMS, allows insertion of new data, but not the modification of existing data,
or a failure of a communication link making some sites inaccessible, does e.g., insertion of tuple in a relation. 3) UPDATE: allows modification of
not make the entire system inoperable. data, but not its deletion. But data items like primary-key attributes may
Improved availability The data in a distributed system may be replicated not be modified.
so that it exists at more than one site. Thus, the failure of a node or a 4) DELETE: allows deletion of data only
communication link does not necessarily make the data inaccessible. DBMS 3-tier Architecture
Improved performance As the data is located near the site of its DBMS 3-tier architecture divides the complete system into three inter-
demand, and given the inherent parallelism due to multiple copies, related but independent modules as --
speed of database access may be better for distributed databases than
that of the speed that is achievable through a remote centralised
database.
Speedup Query Processing A query that involves data at several sites
can be split into sub-queries. These subqueries can be executed in
parallel by several sites. Such parallel sub-query evaluation allows faster
processing of a user's query.
Economics It is now generally accepted that it costs less to create a
system of smaller computers with the equivalent power of a single large
computer. It is more cost-effective to obtain separate computers.
Physical Level/Internal level: At the physical level, the information
Modular growth In distributed environments, it is easier to expand. New
about the location of database objects in the data store is kept. Various
sites can be added to the network without affecting the operations of
users of DBMS are unaware of the locations of these objects.In simple
other sites, as they are somewhat independent.
terms,physical level of a database describes how the data is being stored
in secondary storage devices like disks and tapes and also gives insights
on additional storage details.
Conceptual Level/Global level: At conceptual level, data is represented
in the form of various database tables. For Example, STUDENT database
may contain STUDENT and COURSE tables which will be visible to users
but users are unaware of their storage.Also referred as logical schema,it
describes what kind of data is to be stored in the database.
External Level / View Level: An external level specifies a view of the
data in terms of conceptual level tables. Each external level view is used
to cater to the needs of a particular category of users. For Example,
FACULTY of a university is interested in looking course details of
students, STUDENTS are interested in looking at all details related to
academics, accounts, courses and hostel details as well. So, different
views can be generated for different users. The main focus of external
level is data abstraction.

You might also like