Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Database Software redirects here. For the computer vides access to all of the data contained in the database
program, see Europress. (although restrictions may exist that limit access to par-
A database is an organized collection of data.[1] It is ticular data). The DBMS provides various functions that
allow entry, storage and retrieval of large quantities of
information and provides ways to manage how that infor-
mation is organized.
Because of the close relationship between them, the
term database is often used casually to refer to both a
database and the DBMS used to manipulate it.
Outside the world of professional information technol-
ogy, the term database is often used to refer to any collec-
tion of related data (such as a spreadsheet or a card index).
This article is concerned only with databases where the
size and usage requirements necessitate use of a database
An example of a SQL database query. management system.[2]
the collection of schemas, tables, queries, reports, views, Existing DBMSs provide various functions that allow
and other objects. The data are typically organized to management of a database and its data which can be clas-
model aspects of reality in a way that supports processes sied into four main functional groups:
requiring information, such as modelling the availability
of rooms in hotels in a way that supports nding a hotel Data denition Creation, modication and removal
with vacancies. of denitions that dene the organization of the data.
A database management system (DBMS) is a Update Insertion, modication, and deletion of the
computer software application that interacts with the actual data.[3]
user, other applications, and the database itself to cap-
ture and analyze data. A general-purpose DBMS is de- Retrieval Providing information in a form directly
signed to allow the denition, creation, querying, update, usable or for further processing by other applica-
and administration of databases. Well-known DBMSs tions. The retrieved data may be made available in a
include MySQL, PostgreSQL, MongoDB, MariaDB, form basically the same as it is stored in the database
Microsoft SQL Server, Oracle, Sybase, SAP HANA, or in a new form obtained by altering or combining
MemSQL and IBM DB2. A database is not generally existing data from the database.[4]
portable across dierent DBMSs, but dierent DBMS
can interoperate by using standards such as SQL and Administration Registering and monitoring users,
ODBC or JDBC to allow a single application to work with enforcing data security, monitoring performance,
more than one DBMS. Database management systems maintaining data integrity, dealing with concurrency
are often classied according to the database model that control, and recovering information that has been
they support; the most popular database systems since corrupted by some event such as an unexpected sys-
the 1980s have all supported the relational model as rep- tem failure.[5]
resented by the SQL language. Sometimes a DBMS is
loosely referred to as a 'database'. Both a database and its DBMS conform to the princi-
ples of a particular database model.[6] Database system
refers collectively to the database model, database man-
1 Terminology and overview agement system, and database.[7]
Physically, database servers are dedicated computers
Formally, a database refers to a set of related data and that hold the actual databases and run only the DBMS
the way it is organized. Access to this data is usually pro- and related software. Database servers are usually
vided by a database management system (DBMS) con- multiprocessor computers, with generous memory and
sisting of an integrated set of computer software that al- RAID disk arrays used for stable storage. RAID is used
lows users to interact with one or more databases and pro- for recovery of data if any of the disks fail. Hardware
1
2 4 HISTORY
database accelerators, connected to one or more servers the functions of a general-purpose DBMS such as the in-
via a high-speed channel, are also used in large volume sertion and deletion of messages composed of various
transaction processing environments. DBMSs are found items of data or associating messages with a particular
at the heart of most database applications. DBMSs may email address; but these functions are limited to what is
be built around a custom multitasking kernel with built- required to handle email and don't provide the user with
in networking support, but modern DBMSs typically rely all of the functionality that would be available using a
on a standard operating system to provide these functions general-purpose DBMS.
from databases before the inception of Structured Query Many other databases have application software that ac-
Language (SQL). The data recovered was disparate, re-
cesses the database on behalf of end-users, without ex-
dundant and disorderly, since there was no proper method posing the DBMS interface directly. Application pro-
to fetch it and arrange it in a concrete structure.
grammers may use a wire protocol directly, or more likely
Since DBMSs comprise a signicant economical market, through an application programming interface. Database
computer and storage vendors often take into account designers and database administrators interact with the
DBMS requirements in their own development plans.[8] DBMS through dedicated interfaces to build and main-
Databases and DBMSs can be categorized according to tain the applications databases, and thus need some more
the database model(s) that they support (such as relational knowledge and understanding about how DBMSs operate
or XML), the type(s) of computer they run on (from a and the DBMSs external interfaces and tuning parame-
server cluster to a mobile phone), the query language(s) ters.
used to access the database (such as SQL or XQuery), and
their internal engineering, which aects performance,
scalability, resilience, and security. 4 History
Following the technology progress in the areas of
processors, computer memory, computer storage, and
2 Applications computer networks, the sizes, capabilities, and per-
formance of databases and their respective DBMSs
Databases are used to support internal operations of or- have grown in orders of magnitude. The develop-
ganizations and to underpin online interactions with cus- ment of database technology can be divided into three
tomers and suppliers (see Enterprise software). eras based on data model or structure: navigational,[9]
Databases are used to hold administrative information SQL/relational, and post-relational.
and more specialized data, such as engineering data or The two main early navigational data models were the
economic models. Examples of database applications hierarchical model, epitomized by IBMs IMS system,
include computerized library systems, ight reservation and the CODASYL model (network model), imple-
systems, computerized parts inventory systems, and many mented in a number of products such as IDMS.
content management systems that store websites as col-
The relational model, rst proposed in 1970 by Edgar F.
lections of webpages in a database.
Codd, departed from this tradition by insisting that ap-
plications should search for data by content, rather than
by following links. The relational model employs sets
3 General-purpose and special- of ledger-style tables, each used for a dierent type of
entity. Only in the mid-1980s did computing hardware
purpose DBMSs become powerful enough to allow the wide deployment
of relational systems (DBMSs plus applications). By the
A DBMS has evolved into a complex software system and early 1990s, however, relational systems dominated in all
its development typically requires thousands of human large-scale data processing applications, and as of 2015
years of development eort.[lower-alpha 1] Some general- they remain dominant : IBM DB2, Oracle, MySQL, and
purpose DBMSs such as Adabas, Oracle and DB2 have Microsoft SQL Server are the top DBMS.[10] The dom-
been undergoing upgrades since the 1970s. General- inant database language, standardised SQL for the rela-
purpose DBMSs aim to meet the needs of as many appli- tional model, has inuenced database languages for other
cations as possible, which adds to the complexity. How- data models.
ever, the fact that their development cost can be spread
over a large number of users means that they are often Object databases were developed in the 1980s to over-
the most cost-eective approach. However, a general- come the inconvenience of object-relational impedance
purpose DBMS is not always the optimal solution: in mismatch, which led to the coining of the term post-
some cases a general-purpose DBMS may introduce un- relational and also the development of hybrid object-
necessary overhead. Therefore, there are many examples relational databases.
of systems that use special-purpose databases. A com- The next generation of post-relational databases in the
mon example is an email system that performs many of late 2000s became known as NoSQL databases, in-
4.2 1970s, relational DBMS 3
troducing fast key-value stores and document-oriented Store (IDS), founded the Database Task Group within
databases. A competing next generation known as CODASYL, the group responsible for the creation and
NewSQL databases attempted new implementations that standardization of COBOL. In 1971, the Database Task
retained the relational/SQL model while aiming to match Group delivered their standard, which generally became
the high performance of NoSQL compared to commer- known as the CODASYL approach, and soon a number
cially available relational DBMSs. of commercial products based on this approach entered
the market.
The CODASYL approach relied on the manual navi-
4.1 1960s, navigational DBMS gation of a linked data set which was formed into a large
network. Applications could nd records by one of three
Further information: Navigational database methods:
The introduction of the term database coincided with
1. Use of a primary key (known as a CALC key, typi-
cally implemented by hashing)
2. Navigating relationships (called sets) from one
record to another
3. Scanning all the records in a sequential order
for any one record could be left empty. The relational lection is something that traditional computer languages
model solved this by splitting the data into a series of are not designed for.
normalized tables (or relations), with optional elements Just as the navigational approach would require programs
being moved out of the main table to where they would to loop in order to collect records, the relational ap-
take up room only if needed. Data may be freely inserted, proach would require loops to collect information about
deleted and edited in these tables, with the DBMS doing any one record. Codds solution to the necessary loop-
whatever maintenance needed to present a table view to ing was a set-oriented language, a suggestion that would
the application/user. later spawn the ubiquitous SQL. Using a branch of math-
ematics known as tuple calculus, he demonstrated that
"key" such a system could support all the operations of normal
databases (inserting, updating etc.) as well as providing
login first last a simple system for nding and returning sets of data in a
single operation.
mark Samuel Clemens Codds paper was picked up by two people at Berkeley,
lion Lion Kimbro Eugene Wong and Michael Stonebraker. They started
a project known as INGRES using funding that had al-
kitty Amber Straub ready been allocated for a geographical database project
and student programmers to produce code. Beginning
login phone in 1973, INGRES delivered its rst test products which
were generally ready for widespread use in 1979. IN-
mark 555.555.5555 GRES was similar to System R in a number of ways, in-
"related table" cluding the use of a language for data access, known as
QUEL. Over time, INGRES moved to the emerging SQL
standard.
In the relational model, records are linked using virtual keys
IBM itself did one test implementation of the relational
not stored in the database but dened as needed between the data
model, PRTV, and a production one, Business System
contained in the records.
12, both now discontinued. Honeywell wrote MRDS
for Multics, and now there are two new implementa-
The relational model also allowed the content of the
tions: Alphora Dataphor and Rel. Most other DBMS im-
database to evolve without constant rewriting of links and
plementations usually called relational are actually SQL
pointers. The relational part comes from entities refer-
DBMSs.
encing other entities in what is known as one-to-many
relationship, like a traditional hierarchical model, and In 1970, the University of Michigan began develop-
many-to-many relationship, like a navigational (network) ment of the MICRO Information Management Sys-
model. Thus, a relational model can express both hierar- tem[14] based on D.L. Childs Set-Theoretic Data model.
chical and navigational models, as well as its native tab- [15][16][17] MICRO was used to manage very large data
ular model, allowing for pure or combined modeling in sets by the US Department of Labor, the U.S. Envi-
terms of these three models, as the application requires. ronmental Protection Agency, and researchers from the
University of Alberta, the University of Michigan, and
For instance, a common use of a database system is to
Wayne State University. It ran on IBM mainframe com-
track information about users, their name, login infor-
puters using the Michigan Terminal System.[18] The sys-
mation, various addresses and phone numbers. In the
tem remained in production until 1998.
navigational approach, all of this data would be placed
in a single record, and unused items would simply not be
placed in the database. In the relational approach, the
data would be normalized into a user table, an address
4.3 Integrated approach
table and a phone number table (for instance). Records
would be created in these optional tables only if the ad- Main article: Database machine
dress or phone numbers were actually provided.
Linking the information back together is the key to this In the 1970s and 1980s, attempts were made to build
system. In the relational model, some bit of information database systems with integrated hardware and software.
was used as a "key", uniquely dening a particular record. The underlying philosophy was that such integration
When information was being collected about a user, in- would provide higher performance at lower cost. Exam-
formation stored in the optional tables would be found by ples were IBM System/38, the early oering of Teradata,
searching for this key. For instance, if the login name of a and the Britton Lee, Inc. database machine.
user is unique, addresses and phone numbers for that user Another approach to hardware support for database man-
would be recorded with the login name as its key. This agement was ICL's CAFS accelerator, a hardware disk
simple re-linking of related data back into a single col- controller with programmable search capabilities. In
4.6 1990s, object-oriented 5
the long term, these eorts were generally unsuccessful Ratli the creator of dBASE stated: dBASE was dif-
because specialized database machines could not keep ferent from programs like BASIC, C, FORTRAN, and
pace with the rapid development and progress of general- COBOL in that a lot of the dirty work had already been
purpose computers. Thus most database systems nowa- done. The data manipulation is done by dBASE instead
days are software systems running on general-purpose of by the user, so the user can concentrate on what he
hardware, using general-purpose computer data storage. is doing, rather than having to mess with the dirty de-
However this idea is still pursued for certain applications tails of opening, reading, and closing les, and managing
by some companies like Netezza and Oracle (Exadata). space allocation.[19] dBASE was one of the top selling
software titles in the 1980s and early 1990s.
In recent years, there was a high demand for massively able to run on servers with 100TB main memory
distributed databases with high partition tolerance but powered by IBM. The co founder of the company
according to the CAP theorem it is impossible for a claimed that the system was big enough to run the 8
distributed system to simultaneously provide consistency, largest SAP customers.
availability, and partition tolerance guarantees. A dis-
tributed system can satisfy any two of these guarantees An active database includes an event-driven archi-
at the same time, but not all three. For that reason, many tecture which can respond to conditions both inside
NoSQL databases are using what is called eventual con- and outside the database. Possible uses include secu-
sistency to provide both availability and partition toler- rity monitoring, alerting, statistics gathering and au-
ance guarantees with a reduced level of data consistency. thorization. Many databases provide active database
features in the form of database triggers.
NewSQL is a class of modern relational databases
that aims to provide the same scalable performance
A cloud database relies on cloud technology. Both
of NoSQL systems for online transaction processing
the database and most of its DBMS reside remotely,
(read-write) workloads while still using SQL and main-
in the cloud, while its applications are both de-
taining the ACID guarantees of a traditional database
veloped by programmers and later maintained and
system. Such databases include ScaleBase, Clustrix,
utilized by (applications) end-users through a web
EnterpriseDB, MemSQL, NuoDB,[25] and VoltDB.
browser and Open APIs.
A federated database system comprises several dis- product components, parts inventory, and nan-
tinct databases, each with its own DBMS. It is han- cial databases that keep track of the organizations
dled as a single database by a federated database money, accounting and nancial dealings.
management system (FDBMS), which transparently
integrates multiple autonomous DBMSs, possibly of A parallel database seeks to improve performance
dierent types (in which case it would also be a through parallelization for tasks such as loading data,
heterogeneous database system), and provides them building indexes and evaluating queries.
with an integrated conceptual view.
The major parallel DBMS architec-
Sometimes the term multi-database is used as a syn- tures which are induced by the un-
onym to federated database, though it may refer derlying hardware architecture are:
to a less integrated (e.g., without an FDBMS and
a managed integrated schema) group of databases Shared memory archi-
that cooperate in a single application. In this tecture, where multiple
case, typically middleware is used for distribution, processors share the main
which typically includes an atomic commit protocol memory space, as well as
(ACP), e.g., the two-phase commit protocol, to al- other data storage.
low distributed (global) transactions across the par- Shared disk architecture,
ticipating databases. where each processing unit
(typically consisting of mul-
A graph database is a kind of NoSQL database that tiple processors) has its own
uses graph structures with nodes, edges, and prop- main memory, but all units
erties to represent and store information. General share the other storage.
graph databases that can store any graph are distinct
Shared nothing architec-
from specialized graph databases such as triplestores
ture, where each processing
and network databases.
unit has its own main memory
An array DBMS is a kind of NoSQL DBMS that and other storage.
allows to model, store, and retrieve (usually large)
multi-dimensional arrays such as satellite images Probabilistic databases employ fuzzy logic to draw
and climate simulation output. inferences from imprecise data.
In a hypertext or hypermedia database, any word or Real-time databases process transactions fast
a piece of text representing an object, e.g., another enough for the result to come back and be acted on
piece of text, an article, a picture, or a lm, can be right away.
hyperlinked to that object. Hypertext databases are
particularly useful for organizing large amounts of A spatial database can store the data with multi-
disparate information. For example, they are useful dimensional features. The queries on such data
for organizing online encyclopedias, where users can include location-based queries, like Where is the
conveniently jump around the text. The World Wide closest hotel in my area?".
Web is thus a large distributed hypertext database.
A temporal database has built-in time aspects, for
A knowledge base (abbreviated KB, kb or [28][29] ) example a temporal data model and a temporal ver-
is a special kind of database for knowledge man- sion of SQL. More specically the temporal aspects
agement, providing the means for the computerized usually include valid-time and transaction-time.
collection, organization, and retrieval of knowledge.
Also a collection of data representing problems with A terminology-oriented database builds upon an
their solutions and related experiences. object-oriented database, often customized for a
specic eld.
A mobile database can be carried on or synchronized
from a mobile computing device. An unstructured data database is intended to store
in a manageable and protected way diverse objects
Operational databases store detailed data about that do not t naturally and conveniently in com-
the operations of an organization. They typically mon databases. It may include email messages,
process relatively high volumes of updates using documents, journals, multimedia objects, etc. The
transactions. Examples include customer databases name may be misleading since some objects can be
that record contact, credit, and demographic in- highly structured. However, the entire possible ob-
formation about a business customers, personnel ject collection does not t into a predened struc-
databases that hold information such as salary, ben- tured framework. Most established DBMSs now
ets, skills data about employees, enterprise re- support unstructured data in various ways, and new
source planning systems that record details about dedicated DBMSs are emerging.
8 7 DESIGN AND MODELING
7 Design and modeling database, and database model for the modelling notation
used to express that design.)
Main article: Database design The most popular database model for general-purpose
The rst task of a database designer is to produce a databases is the relational model, or more precisely, the
relational model as represented by the SQL language.
The process of creating a logical database design us-
ing this model uses a methodical approach known as
normalization. The goal of normalization is to ensure
that each elementary fact is only recorded in one place,
so that insertions, updates, and deletions automatically
maintain consistency.
The nal stage of database design is to make the decisions
that aect performance, scalability, recovery, security,
and the like. This is often called physical database design.
A key goal during this stage is data independence, mean-
ing that the decisions made for performance optimization
purposes should be invisible to end-users and applica-
tions. There are two types of data independence: Physical
conceptual data model that reects the structure of the data independence and logical data independence. Physi-
information to be held in the database. A common ap- cal design is driven mainly by performance requirements,
proach to this is to develop an entity-relationship model, and requires a good knowledge of the expected workload
often with the aid of drawing tools. Another popular ap- and access patterns, and a deep understanding of the fea-
proach is the Unied Modeling Language. A successful tures oered by the chosen DBMS.
data model will accurately reect the possible state of the
Another aspect of physical database design is security. It
external world being modeled: for example, if people can
involves both dening access control to database objects
have more than one phone number, it will allow this in-
as well as dening security levels and methods for the data
formation to be captured. Designing a good conceptual
itself.
data model requires a good understanding of the applica-
tion domain; it typically involves asking deep questions
about the things of interest to an organisation, like can
a customer also be a supplier?", or if a product is sold 7.1 Models
with two dierent forms of packaging, are those the same
product or dierent products?", or if a plane ies from Main article: Database model
New York to Dubai via Frankfurt, is that one ight or two A database model is a type of data model that deter-
(or maybe even three)?". The answers to these questions
establish denitions of the terminology used for entities
(customers, products, ights, ight segments) and their
relationships and attributes.
Producing the conceptual data model sometimes involves
input from business processes, or the analysis of workow
in the organization. This can help to establish what infor-
mation is needed in the database, and what can be left
out. For example, it can help when deciding whether the
database needs to hold historic data as well as current
data.
Having produced a conceptual data model that users are
happy with, the next stage is to translate this into a schema
that implements the relevant data structures within the
Collage of ve types of database models
database. This process is often called logical database
design, and the output is a logical data model expressed
in the form of a schema. Whereas the conceptual data mines the logical structure of a database and fundamen-
model is (in theory at least) independent of the choice tally determines in which manner data can be stored, or-
of database technology, the logical data model will be ganized, and manipulated. The most popular example of
expressed in terms of a particular database model sup- a database model is the relational model (or the SQL ap-
ported by the chosen DBMS. (The terms data model and proximation of relational), which uses a table-based for-
database model are often used interchangeably, but in mat.
this article we use data model for the design of a specic Common logical data models for databases include:
7.2 External, conceptual, and internal views 9
Navigational databases
Hierarchical database model
Network model
Graph database
Relational model
Entityrelationship model
Enhanced entityrelationship model
External Schema Internal Schema
Object model
-User View- -Computer View-
Document model
Entityattributevalue model Traditional view of data[30]
Star schema
The conceptual level unies the various external
An object-relational database combines the two related views into a compatible global view.[31] It provides
structures. the synthesis of all the external views. It is out of
the scope of the various database end-users, and is
Physical data models include: rather of interest to database application developers
and database administrators.
Inverted index
The internal level (or physical level) is the inter-
Flat le nal organization of data inside a DBMS. It is con-
cerned with cost, performance, scalability and other
Other models include: operational matters. It deals with storage layout of
the data, using storage structures such as indexes to
Associative model enhance performance. Occasionally it stores data
of individual views (materialized views), computed
Multidimensional model from generic data, if performance justication ex-
ists for such redundancy. It balances all the external
Array model
views performance requirements, possibly conict-
Multivalue model ing, in an attempt to optimize overall performance
across all activities.
Specialized models are optimized for particular types of
data: While there is typically only one conceptual (or logical)
and physical (or internal) view of the data, there can be
XML database any number of dierent external views. This allows users
to see database information in a more business-related
Semantic model way rather than from a technical, processing viewpoint.
For example, a nancial department of a company needs
Content store
the payment details of all employees as part of the com-
Event store panys expenses, but does not need details about employ-
ees that are the interest of the human resources depart-
Time series model ment. Thus dierent departments need dierent views
of the companys database.
7.2 External, conceptual, and internal The three-level database architecture relates to the con-
views cept of data independence which was one of the major
initial driving forces of the relational model. The idea
A database management system provides three views of is that changes made at a certain level do not aect the
the database data: view at a higher level. For example, changes in the inter-
nal level do not aect application programs written using
The external level denes how each group of end- conceptual level interfaces, which reduces the impact of
users sees the organization of data in the database. making physical changes to improve performance.
A single database can have any number of views at The conceptual view provides a level of indirection be-
the external level. tween internal and external. On one hand it provides a
10 9 PERFORMANCE, SECURITY, AND AVAILABILITY
common view of the database, independent of dierent SQL/XML combines XQuery with SQL.[34]
external view structures, and on the other hand it abstracts
away details of how the data are stored or managed (inter- A database language may also incorporate features like:
nal level). In principle every level, and even every exter-
nal view, can be presented by a dierent data model. In
practice usually a given DBMS uses the same data model DBMS-specic Conguration and storage engine
for both the external and the conceptual levels (e.g., rela- management
tional model). The internal level, which is hidden inside
Computations to modify query results, like count-
the DBMS and depends on its implementation, requires
ing, summing, averaging, sorting, grouping, and
a dierent level of detail and uses its own types of data
cross-referencing
structure types.
Separating the external, conceptual and internal levels was Constraint enforcement (e.g. in an automotive
a major feature of the relational database model imple- database, only allowing one engine type per car)
mentations that dominate 21st century databases.[31]
Application programming interface version of the
query language, for programmer convenience
8 Languages
Database languages are special-purpose languages, which
9 Performance, security, and avail-
do one or more of the following: ability
Data denition language denes data types such as Because of the critical importance of database technology
creating, altering, or dropping and the relationships to the smooth running of an enterprise, database systems
among them include complex mechanisms to deliver the required per-
formance, security, and availability, and allow database
Data manipulation language performs tasks such administrators to control the use of these features.
as inserting, updating, or deleting data occurrences
of needed information from the data (e.g., when querying queries), or utilizing specic access paths to the former
the database). (e.g., using specic indexes or other data structures to ac-
Some DBMSs support specifying which character encod- cess information). Database access controls are set by
ing was used to store data, so multiple encodings can be special authorized (by the database owner) personnel that
used in the same database. uses dedicated protected security DBMS interfaces.
Various low-level database storage structures are used by This may be managed directly on an individual basis, or
by the assignment of individuals and privileges to groups,
the storage engine to serialize the data model so it can
be written to the medium of choice. Techniques such as or (in the most elaborate models) through the assignment
indexing may be used to improve performance. Conven- of individuals and groups to roles which are then granted
tional storage is row-oriented, but there are also column- entitlements. Data security prevents unauthorized users
oriented and correlation databases. from viewing or updating the database. Using passwords,
users are allowed access to the entire database or sub-
sets of it called subschemas. For example, an employee
9.1.1 Materialized views database can contain all the data about an individual em-
ployee, but one group of users may be authorized to view
Main article: Materialized view only payroll data, while others are allowed access to only
work history and medical data. If the DBMS provides
a way to interactively enter and update the database, as
Often storage redundancy is employed to increase per-
well as interrogate it, this capability allows for managing
formance. A common example is storing materialized
personal databases.
views, which consist of frequently needed external views
or query results. Storing such views saves the expensive Data security in general deals with protecting specic
computing of them each time they are needed. The down- chunks of data, both physically (i.e., from corruption, or
sides of materialized views are the overhead incurred destruction, or removal; e.g., see physical security), or the
when updating them to keep them synchronized with their interpretation of them, or parts of them to meaningful in-
original updated database data, and the cost of storage re- formation (e.g., by looking at the strings of bits that they
dundancy. comprise, concluding specic valid credit-card numbers;
e.g., see data encryption).
9.1.2 Replication Change and access logging records who accessed which
attributes, what was changed, and when it was changed.
Main article: Database replication Logging services allow for a forensic database audit
later by keeping a record of access occurrences and
changes. Sometimes application-level code is used to
Occasionally a database employs storage redundancy by record changes rather than leaving this to the database.
database objects replication (with one or more copies) to Monitoring can be set up to attempt to detect security
increase data availability (both to improve performance breaches.
of simultaneous multiple end-user accesses to a same
database object, and to provide resiliency in a case of par-
tial failure of a distributed database). Updates of a repli-
cated object need to be synchronized across the object
copies. In many cases, the entire database is replicated. 9.3 Transactions and concurrency
Main article: Database security Database transactions can be used to introduce some level
of fault tolerance and data integrity after recovery from a
Database security deals with all various aspects of pro- crash. A database transaction is a unit of work, typically
tecting the database content, its owners, and its users. encapsulating a number of operations over a database
It ranges from protection from intentional unauthorized (e.g., reading a database object, writing, acquiring lock,
database uses to unintentional database accesses by unau- etc.), an abstraction supported in database and also other
thorized entities (e.g., a person or a computer program). systems. Each transaction has well dened boundaries
Database access control deals with controlling who (a in terms of which program/code executions are included
person or a certain computer program) is allowed to ac- in that transaction (determined by the transactions pro-
cess what information in the database. The informa- grammer via special transaction commands).
tion may comprise specic database objects (e.g., record The acronym ACID describes some ideal properties of a
types, specic records, data structures), certain compu- database transaction: Atomicity, Consistency, Isolation,
tations over certain objects (e.g., query types, or specic and Durability.
12 9 PERFORMANCE, SECURITY, AND AVAILABILITY
A database built with one DBMS is not portable to an- Sometimes it is desired to bring a database back to a
other DBMS (i.e., the other DBMS cannot run it). How- previous state (for many reasons, e.g., cases when the
ever, in some situations, it is desirable to move, migrate database is found corrupted due to a software error, or if
a database from one DBMS to another. The reasons are it has been updated with erroneous data). To achieve this,
primarily economical (dierent DBMSs may have dier- a backup operation is done occasionally or continuously,
ent total costs of ownership or TCOs), functional, and op- where each desired database state (i.e., the values of its
erational (dierent DBMSs may have dierent capabili- data and their embedding in databases data structures) is
ties). The migration involves the databases transforma- kept within dedicated backup les (many techniques ex-
tion from one DBMS type to another. The transformation ist to do this eectively). When this state is needed, i.e.,
should maintain (if possible) the database related applica- when it is decided by a database administrator to bring the
tion (i.e., all related application programs) intact. Thus, database back to this state (e.g., by specifying this state
the databases conceptual and external architectural lev- by a desired point in time when the database was in this
els should be maintained in the transformation. It may be state), these les are utilized to restore that state.
desired that also some aspects of the architecture internal
level are maintained. A complex or large database migra-
tion may be a complicated and costly (one-time) project 9.7 Static analysis
by itself, which should be factored into the decision to mi-
grate. This in spite of the fact that tools may exist to help Static analysis techniques for software verication can
migration between specic DBMSs. Typically, a DBMS be applied also in the scenario of query languages. In
vendor provides tools to help importing databases from particular, the *Abstract interpretation framework has
other popular DBMSs. been extended to the eld of query languages for rela-
tional databases as a way to support sound approximation
techniques.[35] The semantics of query languages can be
tuned according to suitable abstractions of the concrete
domain of data. The abstraction of relational database
9.5 Building, maintaining, and tuning system has many interesting applications, in particular,
for security purposes, such as ne grained access control,
Main article: Database tuning watermarking, etc.
Increasingly, there are calls for a single system [5] Administration - Denition of administration by
and methodology that incorporates all of these core Merriam-Webster. merriam-webster.com.
functionalities into the same build, test, and de-
[6] Tsitchizris & Lochovsky 1982.
ployment framework for database management and
source control.[36] Borrowing from other develop- [7] BeynonDavies 2004.
ments in the software industry, some are labeling
[8] Nelson & Nelson 2001.
such oerings "DevOps for Database". Packaged
thusly, these database management solutions are [9] Bachman 1973.
supposed to be stable, secure, backed up, compli-
ant, testable, and consistent between environments. [10] TOPDB Top Database index. pypl.github.io.
Data store [19] Interview with Wayne Ratli. The FoxPro History. Re-
trieved on 2013-07-12.
Database theory
[20] Development of an object-oriented DBMS; Portland, Ore-
Database testing gon, United States; Pages: 472482; 1986; ISBN 0-
89791-204-7
Database-centric architecture
[21] Oracle Berkeley DB XML (PDF). Retrieved 10 March
Journal of Database Management 2015.
[30] itl.nist.gov (1993) Integration Denition for Information Halder, Raju; Cortesi, Agostino. Abstract
Modeling (IDEFIX). 21 December 1993. Interpretation of Database Query Languages
(PDF). COMPUTER LANGUAGES, SYSTEMS
[31] Date 2003, pp. 3132.
& STRUCTURES. Elsevier. 38 (2): 123157.
[32] Chapple 2005. doi:10.1016/j.cl.2011.10.004. ISSN 1477-8424.
[36] How Database Administration Fits into DevOps. Re- Nelson, Anne Fulcher; Nelson, William Harris
trieved 26 September 2016. Morehead (2001). Building Electronic Commerce:
With Web Database Constructions. Prentice Hall.
ISBN 978-0201741308.
13 Sources
North, Ken (10 March 2010). Sets, Data Models
Bachman, Charles W. (1973). The Programmer as and Data Independence. Dr. Dobbs. Archived
Navigator. Communications of the ACM. 16 (11): from the original on 24 October 2010.
653658. doi:10.1145/355611.362534. (subscrip-
tion required (help)). Proctor, Seth (12 July 2013). Exploring the Archi-
tecture of the NuoDB Database, Part 1. Archived
BeynonDavies, Paul (2003). Database Systems from the original on 15 July 2013. Retrieved 12 July
(3rd ed.). Palgrave Macmillan. ISBN 978- 2013.
1403916013.
Tsitchizris, Dionysios C.; Lochovsky, Fred H.
Chapple, Mike (2005). SQL Fundamentals. (1982). Data Models. PrenticeHall. ISBN 978-
Databases. About.com. Archived from the original 0131964280.
on 22 February 2009. Retrieved 28 January 2009.
Ullman, Jerey; Widom, Jennifer (1997). A First
Childs, David L. (1968). Description of a set- Course in Database Systems. PrenticeHall. ISBN
theoretic data structure (PDF). CONCOMP (Re- 0138613370.
search in Conversational Use of Computers) Project.
Technical Report 3. University of Michigan. Wagner, Michael (2010), SQL/XML:2006
Evaluierung der Standardkonformitt ausgewhlter
Childs, David L. (1968). Feasibility of a set- Datenbanksysteme, Diplomica Verlag, ISBN
theoretic data structure : a general structure based 978-3836696098
on a reconstituted denition (PDF). CONCOMP
(Research in Conversational Use of Computers)
Project. Technical Report 6. University of Michi- 14 Further reading
gan.
Ling Liu and Tamer M. zsu (Eds.) (2009).
Chong, Raul F.; Wang, Xiaomei; Dang, Michael; "Encyclopedia of Database Systems, 4100 p. 60 il-
Snow, Dwaine R. (2007). Introduction to DB2. lus. ISBN 978-0-387-49616-0.
Understanding DB2: Learning Visually with Exam-
Connolly, Thomas and Carolyn Begg. Database Sys-
ples (2nd ed.). ISBN 978-0131580183. Retrieved
tems. New York: Harlow, 2002.
17 March 2013.
Gray, J. and Reuter, A. Transaction Processing:
Codd, Edgar F. (1970). A Relational Model Concepts and Techniques, 1st edition, Morgan Kauf-
of Data for Large Shared Data Banks (PDF). mann Publishers, 1992.
Communications of the ACM. 13 (6): 377387.
doi:10.1145/362384.362685. Kroenke, David M. and David J. Auer. Database
Concepts. 3rd ed. New York: Prentice, 2007.
Date, C. J. (2003). An Introduction to Database Sys- Raghu Ramakrishnan and Johannes Gehrke,
tems (8th ed.). Pearson. ISBN 978-0321197849. Database Management Systems
15
15 External links
Database at DMOZ
DB File extension information about les with the
DB extension
16 16 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES
Pyfan, Mortense, Willking1979, Some jerk on the Internet, Betterusername, Non-dropframe, Captain-tucker, Ngpd, Fgnievinski, Fieldday-
sunday, JephapE, Xhelllox, Vishnava, CanadianLinuxUser, Fluernutter, Cevalsi, MrOllie, Cambalachero, CarsracBot, DFS454, Glane23,
FiriBot, SDSWIKI, Roux, Favonian, Doniago, Exor674, AtheWeatherman, Jasper Deng, Hotsta, Evildeathmath, Tide rolls, Nicoosuna,
Kivar2, Matj Grabovsk, Dart88, Gail, David0811, Duyanfang, Jarble, Arbitrarily0, LuK3, Informatwr, Ben Ben, Luckas-bot, Yobot,
Sudarevic, 2D, OrgasGirl, Bunnyhop11, Fraggle81, Gishac, MarcoAurelio, Pvjohnson, Nallimbot, SwisterTwister, Srdju001, Peter Flass,
Bbb23, N1RK4UDSK714, AnomieBOT, AmritasyaPutra, Rubinbot, Sonia, Jim1138, JackieBot, Piano non troppo, Kingpin13, Ulric1313,
Imfargo, Flewis, Bluerasberry, Materialscientist, Kimsey0, Citation bot, OllieFury, BlurTento, Clark89, Darthvader023, Xqbot, Anders
Torlind, Kimberly ayoma, Sythy2, Llyntegid, Addihockey10, Capricorn42, Bcontins, 4twenty42o, Craftyminion, Grim23, Yossman007,
Preet91119, Tonydent, GrouchoBot, Call me Bubba, Kekekecakes, Bjcubsfan, Earlypsychosis, Prunesqualer, Crashdoom, Amaury, Doulos
Christos, Sophus Bie, The Wiki Octopus, IElonex!, Shadowjams, , Oho1, Dougofborg, Al Wiseman, Chtuw, Captain-n00dle, Gon-
fus, Prari, FrescoBot, Sock, Riverraisin, Fortdj33, Blackguard SF, Dogposter, Mark Renier, StaticVision, HJ Mitchell, Sae1962, Wione,
Weetoddid, ZenerV, Kwiki, Javert, ZooPro, Winterst, Shadowseas, Pinethicket, I dream of horses, HRoestBot, Grsmca, LittleWink, 10me-
treh, Supreme Deliciousness, Hamtechperson, Sissis bd, 28nebraska, Jschnur, Xfact, RedBot, Btilm, MastiBot, Rotanagol, Bharath357,
, 05winsjp, Psaajid, Meaghan, Abhikumar1995, Jandalhandler, Refactored, FoxBot, Pdebee, TobeBot, Mercy11, , Kotet-
suKat, ItsZippy, Lotje, Callanecc, Writeread82, Vrenator, Reidh21234, Reaper Eternal, Luizfsc, TheGrimReaper NS, Xin0427, Suusion
of Yellow, Ping08, SnoFox, BluCreator, Colindolly, TheMesquito, Minimac, Thinktdub, Heysim0n, RazorXX8, DARTH SIDIOUS 2,
Lingliu07, KILLERKEA23, Onel5969, Leonnicholls07, Mean as custard, Helloher, ArwinJ, Kvasilev, Regancy42, FetchcommsAWB,
Timbits82, Aj.robin, Salvio giuliano, Skamecrazy123, Rollins83, EmausBot, John of Reading, FFGeyer, Armen1304, Heymid, Scotty-
Berg, Lores92201, Beta M, Dewritech, GoingBatty, RA0808, RenamedUser01302013, Itafran2010, Knbanker, Winner 42, Carbo1200,
Wikipelli, Dcirovic, K6ka, Sheeana, Ceyjan, Serketan, AsceticRose, Anirudh Emani, Tudorol, Komal.Ar, Pete1248, Savh, Ravinjit,
Joshwa1234567890, F, Josve05a, NicatronTg, Stemoc, M.badnjki, Alpha Quadrant (alt), Tuhl, Makecat, Ocaasi, OnePt618, Tolly4bolly,
W163, TyA, L Kensington, Mayur, Donner60, Mentibot, MainFrame, RockMagnetist, Nz101, Matthewrbowker, Peter Karlsen, GregW-
Photo, GrayFullbuster, Rishu arora11, DASHBotAV, Kellyk99, 28bot, Rocketrod1960, Diamondland, ClueBot NG, SpikeTorontoRCP,
Mechanical digger, Jack Greenmaven, MelbourneStar, Satellizer, Dancayta, Chester Markel, Name Omitted, Bwhynot14, Millermk, Theim-
maculatechemist, Lsschwar, Frietjes, Bowlderizer, Zhoravdb, Widr, Danim, Ugebgroup8, CasualVisitor, Vibhijain, Franky21, Jk2q3jrklse,
Cammo33, Oddbodz, Lbausalop, Cambapp, Strike Eagle, Calabe1992, Doorknob747, Lowercase sigmabot, BG19bot, Freebiekr, Miler-
White, Machdohvah, Tomatronster, Northamerica1000, Wiki13, MusikAnimal, Frze, Dan653, AwamerT, Allecher, Mark Arsten, Som-
chai1029, Vincent Liu, Compfreak7, 110808028 amol, Altar, Foxfax555, Rj Haseeb, Alzpp, Bfugett, Jbrune, Thomasryno, Afree10,
Glacialfox, Rowan Adams, Admrepanther, Era7bd, Soumark, Maxmarengo, Manikandan 2030, Branzman, Melucky2getu, Fylbecat-
ulous, Plavozont, Carliitaeliza, IkamusumeFan, Several Pending, Pratyya Ghosh, Zhaofeng Li, Mrt3366, VNeumann, ChrisGualtieri,
Christophe.billiottet, Lovefamosos, Maty18, Mediran, Khazar2, Deathlasersonline, Saturdayswiki, , FoCuSandLeArN, Codename
Lisa, Mukherjeeassociates, Cerabot~enwiki, Malvikiran, Cheolsoo, R3miixasim, Pebau.grandauer, TwoTwoHello, Lugia2453, Hume42,
Frosty, SFK2, Graphium, Rafaelschp, 069952497a, Reatlas, Phamnhatkhanh, Epicgenius, P2Peter, Acetotyce, Rockonomics, Melonkelon,
Eyesnore, Moazzam chand, JamesMoose, Jabby11, EvergreenFir, Menublogger, Backendgaming, PappaAvMin, Mike99999, Gburd,
Babitaarora, MJunkCat, Boli1107, JJdaboss, Ray Lightyear, BentlijDB, Hshoemark, Melody Lavender, Ginsuloft, D Eaketts, Eddiecarter1,
Eddiejcarter, Mwaci11, Gajurahman, Manul, IrfanSha, AddWittyNameHere, Dkwebsub, JunWan, WPGA2345, Verajohne, Phinicle, Ti-
tle302, JaconaFrere, ElijahLloyd97, Suelru, 7Sidz, Ilan Y Mintz, Monkbot, JewishMonser69, Rajat Kant Singh, Davidcoppereld123, Sun-
rocket89, Nomonomnom, Samster0708, Krushna124, Cabral88, Kitman20022002, MisteArndon, KizzyCode, KBH96, Uoy ylgu dratsab,
Hillysilly, FSahar, Thedinesh4u, Boybudz321, Jesseminisis, ChamithN, Crystallizedcarbon, 0xF8E8, Eurodyne, JensLechtenboerger, Pa-
papasan, Is8ac, Torvolt, Rgeurts, DiscantX, MaurolepisDreki, Top The Ball, Godfarther48, Jack0898, Rob12467, Gfsfg, Uthinkurspecial,
Asdafsd, KasparBot, SaltySloth, Jrgreene2, Timoutiwin, Smedley Rhyse-Frockmorton, Communal t, BadSprad, BU Rob13, AldrinRe-
moto, Vinurarulz, Aishwarya Kolapkar, Yeshii 909, Cani talk, Chenthil Vel, CLCStudent, Prevalence, Entranced98, Piyush2503, Chire01,
Mzakstrz, Omni Flames, Mary McAllen, Reddy.vsp, Gulumeemee, Neemita jain, Marvellous Spider-Man, Aea68, Silksnipe, Richarman,
S.RAMIREZ0216, Bender the Bot, Nikita depolkar, Nehakokate29, Jawanhobe, UnforgivablyPotatoes, Shyam4636, PRAGATI, Pawan-
gosavi37, Shivanirutu, Shivraj Gore, Poojapratu, Nikitamore143, Mrunalsnehalgaikwad, Stikkyy, Purplecuteboss, Alekhyal, DavidSea-
mann, Wireless100 and Anonymous: 2204
16.2 Images
File:Ambox_contradict.svg Source: https://upload.wikimedia.org/wikipedia/commons/2/2e/Ambox_contradict.svg License: Public do-
main Contributors: self-made using Image:Emblem-contradict.svg Original artist: penubag, Rugby471
File:CodasylB.png Source: https://upload.wikimedia.org/wikipedia/commons/d/d6/CodasylB.png License: CC-BY-SA-3.0 Contributors:
CIM: Principles of Computer Integrated Manufacturing, Jean-Baptiste Waldner, John Wiley & Sons, 1992 Original artist: Jean-Baptiste
Waldner
File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: PD Contributors: ? Origi-
nal artist: ?
File:Database_models.jpg Source: https://upload.wikimedia.org/wikipedia/commons/3/3b/Database_models.jpg License: CC BY-SA
3.0 Contributors: Own work Original artist: Marcel Douwe Dekker
File:Folder_Hexagonal_Icon.svg Source: https://upload.wikimedia.org/wikipedia/en/4/48/Folder_Hexagonal_Icon.svg License: Cc-by-
sa-3.0 Contributors: ? Original artist: ?
File:Office-book.svg Source: https://upload.wikimedia.org/wikipedia/commons/a/a8/Office-book.svg License: Public domain Contribu-
tors: This and myself. Original artist: Chris Down/Tango project
File:People_icon.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/37/People_icon.svg License: CC0 Contributors: Open-
Clipart Original artist: OpenClipart
File:Postgres_Query.jpg Source: https://upload.wikimedia.org/wikipedia/commons/c/cb/Postgres_Query.jpg License: CC BY-SA 4.0
Contributors: Own work Original artist: Chire01
File:Process_of_database_design_v2.png Source: https://upload.wikimedia.org/wikipedia/commons/0/09/Process_of_database_
design_v2.png License: CC BY-SA 4.0 Contributors: Own work Original artist: Kitman20022002
18 16 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES