Professional Documents
Culture Documents
File 00866 PDF
File 00866 PDF
DBMS DBMS
Will be extending to petabytes (1000 terabytes or Parallel computing
1000 1000 gigabtyes) True parallel computing allows for quicker
This type of storage requires tertiary storage and access to large amounts of data.
parallel computing. Read many queries at the same time
Tertiary Storage
However,
Multiple disks, larger disks
May also need to break the queries into
Require longer access times (maybe up to several
seconds) subqueries to make efficient use of all resources
CDs stacked and selected by a robot arm
1
DBMS Architecture DBMS Architecture
The data stored may be used by many Security from unwarrented intrusion
applications at the same time concurrency. Should be able to restore data in event of a
DBMS must provide and control concurrent breakdown.
access.
Data integrity is maintained
If not controlled, the data may be corrupted
DB establishes the format of the data and all
Two applications update at the same time.
applications have to use this format.
Security and integrity of the DB should also Originally, files could have same data with
be maintained different formats.
February 05 DBMS Architecture 7 February 05 DBMS Architecture 8
2
DBMS Architecture Storage Manager
Three types of input In simple systems, this will be the file system of
Query the underlying OS.
Questions about data from a generic query interface (SQL In larger systems, the DBMS controls storage on
command line) the disk directly.
Questions from application program interfaces
Broken into two parts buffer manager, file
Modifications manager
To change the data, requests from the same possible sources
File manager manages location of files on disks and
Schema Modifications obtains the blocks required on request.
Usually from authorised personnel to change the schema or to Buffer manager manages main memory, receiving the
create a new database blocks and bringing pages in and out of memory.
February 05 DBMS Architecture 13 February 05 DBMS Architecture 14
3
Enforcing ACID Enforcing ACID
Common techniques include Locking, Logging
Logging and Transaction Commitment. Transactions initiated, changes caused by
Locking transactions, end of each transaction
Generally, the item that the transaction is All recorded by the transaction manager
accessing is locked to some degree. Always written to non volatile storage (will
When locked, access is restricted to avoid survive power failure)
overwriting
Important in assuring durability
Two transactions try to access the same record
for update will cause a conflict.
February 05 DBMS Architecture 19 February 05 DBMS Architecture 20
4
Triggers Multimedia data
A piece of code that is executed when a Has forced expansion.
particular event occurs. Operations on multimedia data are not as
Insertion or deletion of a certain data item. simple as traditional data formats.
When a flight status is changed to cancelled, a Try searching for pictures that shoe people with
query may be run to fine passenger details to green eyes.
notify them May have to let uses add functions that may
Could be extended to try an find alternative flights apply to multimedia data.
for them.