A DBMS includes of four main parts: Modeling language, data structure, database query language, and transaction mechanism:
Modeling language
A data modeling language to define the schema of each database hosted in the DBMS, according to the DBMS database model. The four most common types of organizations are the:
* hierarchical model,
* network model,
* relational model, and
* object model.
Inverted lists and other methods are also used. A given database management system may provide one or more of the four models. The optimal structure depends on the natural organization of the application's data, and on the application's requirements (which include transaction rate (speed), reliability, maintainability, scalability, and cost).
The dominant model in use today is the ad hoc one embedded in SQL, despite the objections of purists who believe this model is a corruption of the relational model, since it violates several of its fundamental principles for the sake of practicality and performance. Many DBMSs also support the Open Database Connectivity API that supports a standard way for programmers to access the DBMS.
Data structure
Data structures (fields, records, files and objects) optimized to deal with very large amounts of data stored on a permanent data storage device (which implies relatively slow access compared to volatile main memory).
Database query language
A database query language and report writer to allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data. It also controls the security of the database. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data.
If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However, it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function.
Transaction mechanism
A database transaction mechanism, that ideally would guarantee the ACID properties, in order to ensure data integrity, despite concurrent user accesses (concurrency control), and faults (fault tolerance). It also maintains the integrity of the data in the database. The DBMS can maintain the integrity of the database by not allowing more than one user to update the same record at the same time. The DBMS can help prevent duplicate records via unique index constraints; for example, no two customers with the same customer numbers (key fields) can be entered into the database. See ACID properties for more information (Redundancy avoidance).
This entry was posted
on Wednesday, December 24, 2008
at 12:16 AM
and is filed under
DBMS building blocks
. You can follow any responses to this entry through the
comments feed
.
Categories
- ACL's
- Advanced Shellcoding Techniques
- Applications of databases
- Basic Networking
- CCNA / CCNP Tutorial: Introduction To NAT
- Cisco's Interior Gateway Routing Protocol
- Cisco's TCP/IP Implementation
- Computer
- COMPUTER HARDWARE
- Computer Hardware (Components Inside cabinet)
- COMPUTER NETWORKING
- Configuring ZoneAlarm Security Settings
- Create An Ftp Server On Your Pc With Serv-u
- Data Security
- Database security
- DATATYPES Etc......)
- DBMS building blocks
- DBMS Topics
- Distributed Database
- Dynamic Routing
- EXCEPTION HANDLING
- Features of the Web
- Flashget Broadband Tweak
- Fox Business Network
- FRIEND FUNCTION
- Generic functions
- Get Away From Trojans(ALL TROJAN PORTS).
- HARDWARE FIREWALL
- History of development
- HOW TO CAPTURE STREAMING MEDIA?
- How To Change Thumbnail Size And Quality
- How To Setup Your Own Dns (Domain Name Server)?
- Important tutorials
- INTERNETWORKING CHALLENGES
- INTRODUCTION TO ROUTERS
- IP and IPv6 Protocols
- JAVA DATATYPES
- JAVA (THREADS
- JAVA NOTES
- JAVA SCRIPT NOTES
- JAVA SCRIPT OBJECTS
- LATEST CONTENT ON BANDWIDTH
- Microprocessor 8085
- Mobile networking through Mobile IP
- MULTICASTING
- Network Fault Tolerance
- Network Port Scanners
- Network Topologies
- Networking(Types of networks)
- OOPS(OBJECT ORIENTED PROGRAMMING)
- OTHER PC HARDWARE COMPONENTS
- RIP and RIP2: Routing Information Protocol
- STRING
- The CTDP Protocol Summary Version 0.6.0
- Traffic Filtering
- Types Of Business Networking
- Types of Network
- Virtual Private Networking
- What Is Network Latency?