
Logical and physical view
Traditional View of Data
A database management system provides the ability for many different users to share data and process resources. But as there can be many different users, there are many different database needs. The question now is: How can a single, unified database meet the differing requirement of so many users?
A DBMS minimizes these problems by providing two views of the database data: a logical (external) view and physical (internal) view. The logical view/user’s view, of a database program represents data in a format that is meaningful to a user and to the software programs that process those data. That is, the logical view tells the user, in user terms, what is in the database. The physical view deals with the actual, physical arrangement and location of data in the direct access storage devices(DASDs). Database specialists use the physical view to make efficient use of storage and processing resources. With the logical view users can see data differently from how they are stored, and they do not want to know all the technical details of physical storage. After all, a business user is primarily interested in using the information, not in how it is stored.
One strength of a DBMS is that while there is only one physical view of the data, there can be an endless number of different logical views. This feature allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. Thus the logical view refers to the way user views data, and the physical view to the way the data are physically stored and processed...
DBMS Features and capabilities
Alternatively, and especially in connection with the relational model of database management, the relation between attributes drawn from a specified set of domains can be seen as being primary. For instance, the database might indicate that a car that was originally "red" might fade to "pink" in time, provided it was of some particular "make" with an inferior paint job. Such higher arity relationships provide information on all of the underlying domains at the same time, with none of them being privileged above the others.
Throughout recent history specialized databases have existed for scientific, geospatial, imaging, document storage and like uses. Functionality drawn from such applications has lately begun appearing in mainstream DBMSs as well. However, the main focus there, at least when aimed at the commercial data processing market, is still on descriptive attributes on repetitive record structures.
Thus, the DBMSs of today roll together frequently-needed services or features of attribute management. By externalizing such functionality to the DBMS, applications effectively share code with each other and are relieved of much internal complexity. Features commonly offered by database management systems include:
Query ability
Querying is the process of requesting attribute information from various perspectives and combinations of factors. Example: "How many 2-door cars in Texas are green?" A database query language and report writer allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data.
Backup and replication
Copies of attributes need to be made regularly in case primary disks or other equipment fails. A periodic copy of attributes may also be created for a distant organization that cannot readily access the original. DBMS usually provide utilities to facilitate the process of extracting and disseminating attribute sets. When data is replicated between database servers, so that the information remains consistent throughout the database system and users cannot tell or even know which server in the DBMS they are using, the system is said to exhibit replication transparency.
Rule enforcement
Often one wants to apply rules to attributes so that the attributes are clean and reliable. For example, we may have a rule that says each car can have only one engine associated with it (identified by Engine Number). If somebody tries to associate a second engine with a given car, we want the DBMS to deny such a request and display an error message. However, with changes in the model specification such as, in this example, hybrid gas-electric cars, rules may need to change. Ideally such rules should be able to be added and removed as needed without significant data layout redesign.
Security
Often it is desirable to limit who can see or change which attributes or groups of attributes. This may be managed directly by individual, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements.
Computation
There are common computations requested on attributes such as counting, summing, averaging, sorting, grouping, cross-referencing, etc. Rather than have each computer application implement these from scratch, they can rely on the DBMS to supply such calculations.
Change and access logging
Often one wants to know who accessed what attributes, what was changed, and when it was changed. Logging services allow this by keeping a record of access occurrences and changes.
Automated optimization
If there are frequently occurring usage patterns or requests, some DBMS can adjust themselves to improve the speed of those interactions. In some cases the DBMS will merely provide tools to monitor performance, allowing a human expert to make the necessary adjustments after reviewing the statistics collected.
Meta-data repository
Metadata is data describing data. For example, a listing that describes what attributes are allowed to be in data sets is called "meta-information". The meta-data is also known as data about data.
Examples of Database Management Systems
* Alpha Five
* DataEase
* Oracle database
* IBM DB2
* Adaptive Server Enterprise
* FileMaker
* Firebird
* Ingres
* Informix
* Mark Logic
* Microsoft Access
* Microsoft SQL Server
* Microsoft Visual FoxPro
* MySQL
* PostgreSQL
* Progress
* SQLite
* Teradata
* CSQL
* OpenLink Virtuoso
* Daffodil DB
This entry was posted
on Wednesday, December 24, 2008
at 12:18 AM
and is filed under
DBMS Topics
. You can follow any responses to this entry through the
comments feed
.
Categories
- ACL's
- Advanced Shellcoding Techniques
- Applications of databases
- Basic Networking
- CCNA / CCNP Tutorial: Introduction To NAT
- Cisco's Interior Gateway Routing Protocol
- Cisco's TCP/IP Implementation
- Computer
- COMPUTER HARDWARE
- Computer Hardware (Components Inside cabinet)
- COMPUTER NETWORKING
- Configuring ZoneAlarm Security Settings
- Create An Ftp Server On Your Pc With Serv-u
- Data Security
- Database security
- DATATYPES Etc......)
- DBMS building blocks
- DBMS Topics
- Distributed Database
- Dynamic Routing
- EXCEPTION HANDLING
- Features of the Web
- Flashget Broadband Tweak
- Fox Business Network
- FRIEND FUNCTION
- Generic functions
- Get Away From Trojans(ALL TROJAN PORTS).
- HARDWARE FIREWALL
- History of development
- HOW TO CAPTURE STREAMING MEDIA?
- How To Change Thumbnail Size And Quality
- How To Setup Your Own Dns (Domain Name Server)?
- Important tutorials
- INTERNETWORKING CHALLENGES
- INTRODUCTION TO ROUTERS
- IP and IPv6 Protocols
- JAVA DATATYPES
- JAVA (THREADS
- JAVA NOTES
- JAVA SCRIPT NOTES
- JAVA SCRIPT OBJECTS
- LATEST CONTENT ON BANDWIDTH
- Microprocessor 8085
- Mobile networking through Mobile IP
- MULTICASTING
- Network Fault Tolerance
- Network Port Scanners
- Network Topologies
- Networking(Types of networks)
- OOPS(OBJECT ORIENTED PROGRAMMING)
- OTHER PC HARDWARE COMPONENTS
- RIP and RIP2: Routing Information Protocol
- STRING
- The CTDP Protocol Summary Version 0.6.0
- Traffic Filtering
- Types Of Business Networking
- Types of Network
- Virtual Private Networking
- What Is Network Latency?