SlideShare a Scribd company logo
Chapter 2: Database System Models
and Architecture
Fundamentals of Database Systems
for 2nd year Computer Science students.
Prepared by: Gebriye Embafresu
- Huawei HCIA Security Certified
- Huawei HCIA Routing and Switching Certified
- Huawei HCIP Routing and Switching Certified
Computer Science Department
E-mail: gebriye14@gmail.com
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
2.1 Data Models, Schemas, and
Instances
• Data Model: A set of concepts to describe the
structure of a database, and certain constraints
that the database should obey. They provide data
abstraction.
• Structure: data type, relationships,
constraints
• It is a collection of conceptual tools for describing
data, data relationships, data semantics, and
consistency constraints.
6-2
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
2.1 Data Models, Schemas, and
Instances
 Relational model
 Entity-Relationship data model (mainly for database design)
 Object-based data models (Object-oriented and Object-relational)
 Semi-structured data model (XML)
 Other older models:
• Network model
• Hierarchical model
6-3
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Relational Model
• All the data is stored in various tables.
• Example of tabular data in the relational model
Columns
Rows
Ted Codd
Turing Award 1981
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
A Sample Relational Database
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
View of Data
An architecture for a database system
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Instances and Schemas
• Similar to types and variables in programming languages
• Logical Schema – the overall logical structure of the database
– Example: The database consists of information about a set of
customers and accounts in a bank and the relationship between them
• Analogous to type information of a variable in a program
• Physical schema – the overall physical structure of the database
• Instance – the actual content of the database at a particular point in time
– Analogous to the value of a variable
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Physical Data Independence
• Physical Data Independence – the ability to modify the physical schema
without changing the logical schema
– Applications depend on the logical schema
– In general, the interfaces between the various levels and components
should be well defined so that changes in some parts do not seriously
influence others.
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Instances and Schemas
• Similar to types and variables in programming languages
• Logical Schema – the overall logical structure of the database
– Example: The database consists of information about a set of
customers and accounts in a bank and the relationship between them
• Analogous to type information of a variable in a program
• Physical schema – the overall physical structure of the database
• Instance – the actual content of the database at a particular point in time
– Analogous to the value of a variable
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Physical Data Independence
• Physical Data Independence – the ability to modify the physical schema
without changing the logical schema
– Applications depend on the logical schema
– In general, the interfaces between the various levels and components
should be well defined so that changes in some parts do not seriously
influence others.
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Data Definition Language (DDL)
• Specification notation for defining the database schema
Example: create table instructor (
ID char(5),
name varchar(20),
dept_name varchar(20),
salary numeric(8,2))
• DDL compiler generates a set of table templates stored in a data
dictionary
• Data dictionary contains metadata (i.e., data about data)
– Database schema
– Integrity constraints
• Primary key (ID uniquely identifies instructors)
– Authorization
• Who can access what
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Data Manipulation Language (DML)
• Language for accessing and updating the data organized by the appropriate data model
– DML also known as query language
• There are basically two types of data-manipulation
language
– Procedural DML -- require a user to specify what data are
needed and how to get those data.
– Declarative DML -- require a user to specify what data are
needed without specifying how to get those data.
• Declarative DMLs are usually easier to learn and use
than are procedural DMLs.
• Declarative DMLs are also referred to as non-procedural
DMLs
• The portion of a DML that involves information retrieval
is called a query language.
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
SQL Query Language
• SQL query language is nonprocedural. A query takes as input several
tables (possibly only one) and always returns a single table.
• Example to find all instructors in Comp. Sci. dept
select name
from instructor
where dept_name = 'Comp. Sci.'
• SQL is NOT a Turing machine equivalent language
• To be able to compute complex functions SQL is usually embedded in
some higher-level language
• Application programs generally access databases through one of
– Language extensions to allow embedded SQL
– Application program interface (e.g., ODBC/JDBC) which
allow SQL queries to be sent to a
database
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Database Access from Application Program
• Non-procedural query languages such as SQL are not as powerful as a
universal Turing machine.
• SQL does not support actions such as input from users, output to displays,
or communication over the network.
• Such computations and actions must be written in a host language, such
as C/C++, Java or Python, with embedded SQL queries that access the
data in the database.
• Application programs -- are programs that are used to interact with the
database in this fashion.
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Database Architecture
• Centralized databases
– One to a few cores, shared memory
• Client-server,
– One server machine executes work on behalf of multiple client
machines.
• Parallel databases
– Many core shared memory
– Shared disk
– Shared nothing
• Distributed databases
– Geographical distribution
– Schema/data heterogeneity
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Database Architecture
(Centralized/Shared-Memory)
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Database Applications
• Two-tier architecture -- the application resides at the client machine,
where it invokes database system functionality at the server machine
• Three-tier architecture -- the client machine acts as a front end and does
not contain any direct database calls.
– The client end communicates with an application server, usually
through a forms interface.
– The application server in turn communicates with a database
system to access data.
Database applications are usually partitioned into two or three parts
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Two-tier and three-tier architectures
(C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified
Database Users

More Related Content

PDF
20CS402 - DATABASE MANAGEMENT SYSTEMS NOTES
PDF
01-Database Administration and Management.pdf
PPTX
Introduction to Database (101) to Akashvani (202) const shortestPath = metroS...
PDF
LectDBS_1.pdf
PDF
(Dbms) class 1 & 2 (Presentation)
PPT
Database Management System Lecture SlideCh-1.ppt
PDF
DBMS 1.pdf from computer application for business
PPTX
INTRODUCTION OF DATA BASE
20CS402 - DATABASE MANAGEMENT SYSTEMS NOTES
01-Database Administration and Management.pdf
Introduction to Database (101) to Akashvani (202) const shortestPath = metroS...
LectDBS_1.pdf
(Dbms) class 1 & 2 (Presentation)
Database Management System Lecture SlideCh-1.ppt
DBMS 1.pdf from computer application for business
INTRODUCTION OF DATA BASE

Similar to Database Management System Lecture SlideCh-2.ppt (20)

PPTX
Chp-1.pptx
PPTX
Introduction to Database
PDF
database introductoin optimization1-app6891.pdf
PDF
M.sc. engg (ict) admission guide database management system 4
PPT
Notes on Understanding RDBMS2 for StudentsS.ppt
PPTX
DATABASE MANAGEMENT SYSTEMS CS 3492.pptx
PDF
Database Systems - Lecture Week 1
PPTX
Unit-1 DBMS24.pptxruzruxtidtixift8ffticiycyoc
PPTX
Ch 2-introduction to dbms
PPT
27 fcs157al2
PPT
Database management system lecture notes
PPTX
Dbms unit i
PPT
data base
PPTX
The Database Management System DBMS.pptx
PPT
Database Systems Concepts, 5th Ed
PPTX
Unit 1_a3a8ea5ab7e65a96a4c41a4868546494.pptx
PPTX
PPTX
DBMS introduction and functionality of of dbms
PPT
Unit01 dbms
Chp-1.pptx
Introduction to Database
database introductoin optimization1-app6891.pdf
M.sc. engg (ict) admission guide database management system 4
Notes on Understanding RDBMS2 for StudentsS.ppt
DATABASE MANAGEMENT SYSTEMS CS 3492.pptx
Database Systems - Lecture Week 1
Unit-1 DBMS24.pptxruzruxtidtixift8ffticiycyoc
Ch 2-introduction to dbms
27 fcs157al2
Database management system lecture notes
Dbms unit i
data base
The Database Management System DBMS.pptx
Database Systems Concepts, 5th Ed
Unit 1_a3a8ea5ab7e65a96a4c41a4868546494.pptx
DBMS introduction and functionality of of dbms
Unit01 dbms
Ad

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
KodekX | Application Modernization Development
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Advanced IT Governance
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
cuic standard and advanced reporting.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Monthly Chronicles - July 2025
KodekX | Application Modernization Development
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
The AUB Centre for AI in Media Proposal.docx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Advanced IT Governance
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
Network Security Unit 5.pdf for BCA BBA.
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Ad

Database Management System Lecture SlideCh-2.ppt

  • 1. Chapter 2: Database System Models and Architecture Fundamentals of Database Systems for 2nd year Computer Science students. Prepared by: Gebriye Embafresu - Huawei HCIA Security Certified - Huawei HCIA Routing and Switching Certified - Huawei HCIP Routing and Switching Certified Computer Science Department E-mail: [email protected]
  • 2. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified 2.1 Data Models, Schemas, and Instances • Data Model: A set of concepts to describe the structure of a database, and certain constraints that the database should obey. They provide data abstraction. • Structure: data type, relationships, constraints • It is a collection of conceptual tools for describing data, data relationships, data semantics, and consistency constraints. 6-2
  • 3. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified 2.1 Data Models, Schemas, and Instances  Relational model  Entity-Relationship data model (mainly for database design)  Object-based data models (Object-oriented and Object-relational)  Semi-structured data model (XML)  Other older models: • Network model • Hierarchical model 6-3
  • 4. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Relational Model • All the data is stored in various tables. • Example of tabular data in the relational model Columns Rows Ted Codd Turing Award 1981
  • 5. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified A Sample Relational Database
  • 6. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified View of Data An architecture for a database system
  • 7. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Instances and Schemas • Similar to types and variables in programming languages • Logical Schema – the overall logical structure of the database – Example: The database consists of information about a set of customers and accounts in a bank and the relationship between them • Analogous to type information of a variable in a program • Physical schema – the overall physical structure of the database • Instance – the actual content of the database at a particular point in time – Analogous to the value of a variable
  • 8. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Physical Data Independence • Physical Data Independence – the ability to modify the physical schema without changing the logical schema – Applications depend on the logical schema – In general, the interfaces between the various levels and components should be well defined so that changes in some parts do not seriously influence others.
  • 9. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Instances and Schemas • Similar to types and variables in programming languages • Logical Schema – the overall logical structure of the database – Example: The database consists of information about a set of customers and accounts in a bank and the relationship between them • Analogous to type information of a variable in a program • Physical schema – the overall physical structure of the database • Instance – the actual content of the database at a particular point in time – Analogous to the value of a variable
  • 10. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Physical Data Independence • Physical Data Independence – the ability to modify the physical schema without changing the logical schema – Applications depend on the logical schema – In general, the interfaces between the various levels and components should be well defined so that changes in some parts do not seriously influence others.
  • 11. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Data Definition Language (DDL) • Specification notation for defining the database schema Example: create table instructor ( ID char(5), name varchar(20), dept_name varchar(20), salary numeric(8,2)) • DDL compiler generates a set of table templates stored in a data dictionary • Data dictionary contains metadata (i.e., data about data) – Database schema – Integrity constraints • Primary key (ID uniquely identifies instructors) – Authorization • Who can access what
  • 12. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Data Manipulation Language (DML) • Language for accessing and updating the data organized by the appropriate data model – DML also known as query language • There are basically two types of data-manipulation language – Procedural DML -- require a user to specify what data are needed and how to get those data. – Declarative DML -- require a user to specify what data are needed without specifying how to get those data. • Declarative DMLs are usually easier to learn and use than are procedural DMLs. • Declarative DMLs are also referred to as non-procedural DMLs • The portion of a DML that involves information retrieval is called a query language.
  • 13. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified SQL Query Language • SQL query language is nonprocedural. A query takes as input several tables (possibly only one) and always returns a single table. • Example to find all instructors in Comp. Sci. dept select name from instructor where dept_name = 'Comp. Sci.' • SQL is NOT a Turing machine equivalent language • To be able to compute complex functions SQL is usually embedded in some higher-level language • Application programs generally access databases through one of – Language extensions to allow embedded SQL – Application program interface (e.g., ODBC/JDBC) which allow SQL queries to be sent to a database
  • 14. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Database Access from Application Program • Non-procedural query languages such as SQL are not as powerful as a universal Turing machine. • SQL does not support actions such as input from users, output to displays, or communication over the network. • Such computations and actions must be written in a host language, such as C/C++, Java or Python, with embedded SQL queries that access the data in the database. • Application programs -- are programs that are used to interact with the database in this fashion.
  • 15. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Database Architecture • Centralized databases – One to a few cores, shared memory • Client-server, – One server machine executes work on behalf of multiple client machines. • Parallel databases – Many core shared memory – Shared disk – Shared nothing • Distributed databases – Geographical distribution – Schema/data heterogeneity
  • 16. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Database Architecture (Centralized/Shared-Memory)
  • 17. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Database Applications • Two-tier architecture -- the application resides at the client machine, where it invokes database system functionality at the server machine • Three-tier architecture -- the client machine acts as a front end and does not contain any direct database calls. – The client end communicates with an application server, usually through a forms interface. – The application server in turn communicates with a database system to access data. Database applications are usually partitioned into two or three parts
  • 18. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Two-tier and three-tier architectures
  • 19. (C) 2013, Gebriye E. Dept. Computer Science HCIA Security, HCIA R&S and HCIP R&S Certified Database Users