Chapter 2.2. Database Development Process
Chapter 2.2. Database Development Process
Functions
CHAPTER 2. CONTEXT FOR DATABASE MANAGEMENT
Database Functions
A Database Management Systems (DBMS)
performs several important functions that
guarantee the integrity and consistency of the
data in the database.
Most of those functions are transparent to end
users, and most can be achieved only through the
use of a DBMS.
Database Functions
Database functions includes the following:
1. Data dictionary management
2. Data storage management
3. Data transformation and presentation
4. Security management
5. Multiuser access control
6. Backup and recovery management
7. Data integrity management
8. Database access languages and application
programming interfaces
9. Database communication interfaces
Database Functions
Illustrating
metadata with
Microsoft SQL
Server Express
METADATA
2. Data storage management
The DBMS creates and manages the complex
structures required for data storage, thus relieving
you from the difficult task of defining and
programming the physical data characteristics.
A modern DBMS provides storage not only for the
data, but also for related data entry forms or
screen definitions, report definitions, data
validation rules, procedural code, structures to
handle video and picture formats, and so on.
Datastorage management is also important for
database performance tuning.
Performance tuning
relates to the activities that make the database
perform more efficiently in terms of storage and
access speed.
although the user sees the database as a single
data storage unit, the DBMS actually stores the
database in multiple physical data files.
Illustrating data storage management with
Oracle
In this figure, such data files may even be stored on different storage media.
Therefore, the DBMS doesn’t have to wait for one disk request to finish before the
next one starts. In other words, the DBMS can fulfill database requests concurrently.
3. Data transformation and presentation
TheDBMS transforms entered data to conform to
required data structures.
The DBMS relieves you of the chore of making a
distinction between the logical data format and
the physical data format.
4. Security management
The DBMS creates a security system that enforces
user security and data privacy.
Security rules determine which users can access
the database, which data items each user can
access, and which data operations (read, add,
delete, or modify) the user can perform.
5. Multiuser access control
To provide data integrity and data consistency,
the DBMS uses sophisticated algorithms to ensure
that multiple users can access the database
concurrently without compromising the integrity of
the database.
6. Backup and recovery management
The DBMS provides backup and data recovery to
ensure data safety and integrity. Current DBMS
systems provide special utilities that allow the DBA
to perform routine and special backup and
restore procedures.
7. Data integrity management
The DBMS promotes and enforces integrity rules,
thus minimizing data redundancy and maximizing
data consistency.
The data relationships stored in the data dictionary
are used to enforce data integrity.
Ensuring data integrity is especially important in
transaction-oriented database systems.
8. Database access languages and application
programming interfaces
The DBMS provides data access through a query
language.
A query language is a nonprocedural language -
one that lets the user specify what must be done
without having to specify how it is to be done.
StructuredQuery Language (SQL) is the de facto
query language and data access standard
supported by the majority of DBMS vendors.
9. Database communication interfaces
Current-generation DBMSs accept end-user
requests via multiple, different network
environments.
Establishing
requirements
Statement of
requirements
analysis
System
specification
Waterfall design
model design
document
implementation
initial system
testing
released
system maintenance
SDLC - Waterfall
The waterfall figure above illustrates a general
waterfall model which could apply to any computer
system development.
It shows the process as a strict sequence of steps
where the output of one step is the input to the next
and all of one step has to be completed before
moving onto the next.
We can use the waterfall process as a means of
identifying the tasks that are required, together with
the input and output for each activity.
The scope of the activities are important, which can
be summarized as follows:
Establishing requirements: This involves consultation
with, and agreement among, stakeholders as to
what they want of a system, expressed as a
statement of requirements.
Analysis: This starts by considering the statement of
requirements and finishes by producing a system
specification.
Design: This begins with a system specification and
produces design documents, and provides a
detailed description of how a system should be
constructed.
Implementation: This is the construction of a
computer system according to a given design
document and taking account of the environment
in which the system will be operating (for example
specific hardware or software available for the
development).
Testing: This compares the implemented system
against the design documents and requirements
specification and produces an acceptance report
or, more usually, a list of errors and bugs that require
a review of the analysis, design and
implementation processes to correct.
Maintenance: This involves dealing with changes in
the requirements, or the implementation
environment, bug fixing or porting of the system to
new environments.
2 Database Life Cycle
Establishing
We can use the waterfall cycle as the requirements
basis for a model of database
development which incorporates three Statement of
assumptions: requirements
Implementation