Mappings between levels and data independence, Database Management System

Assignment Help:

Mappings between Levels and Data Independence

The 3 levels of abstraction in the database do not exist separately of each other. There must be some correspondence, or mapping, among the levels. There are two types of mappings: the internal / conceptual mapping and the conceptual / external mapping.

The internal / conceptual mapping lies among the internal and conceptual levels, and tells the correspondence among the records and the data structures of the internal view and fields of the conceptual view and the files. If the structure of the stored database is changed, then the internal / conceptual mapping must also be changed accordingly so that the view from the conceptual level remains similar. It is this mapping that gives physical data independence for the database. For instance, we may modify the internal view of student relation by breaking the student file into two files, one containing enrolment, address and name and other containing enrolment, programme. Therefore, the mapping will make sure that the conceptual view is restored as original. The storage decision is firstly taken for optimisation purposes.

The external/conceptual view lies between the external and conceptual levels, and tells the correspondence between a particular external view and the conceptual view. Though these two levels are same, some elements discover in a particular external view may be different from the conceptual view. For example, various fields can be combined into a single (virtual) field, which can also have dissimilar names from the original fields. If the structure of the database at the conceptual level is changed, then the conceptual / external mapping must change accordingly so that the view from the external level remains constant. It is this mapping that gives logical data independence for the database. For instance, we may change the student relation to have more fields at conceptual level, yet this will never change the two user views at all.

It is also doable to have another mapping, where one external view is show in terms of other external views (this could be known as external/external mapping). This is useful if various external views are closely related to one another, as it permits you to avoid mapping each of the same external views directly to the conceptual level.


Related Discussions:- Mappings between levels and data independence

Define deferred update technique of recovery, Discuss deferred update techn...

Discuss deferred update technique of recovery.  What are the advantages?  Ans:  The deferred update methods do not physically update the database on disk till after a transact

Entity integrity constraint - relational constraints, It defines that no pr...

It defines that no primary key value can be null. This is as the primary key is used to recognize individual tuple in the relation. So we will not be able to recognize the records

When are they useful justify with an example, When are they useful? Justify...

When are they useful? Justify with an example. The temporary tables are commonly used to support specialized rollups or exact application processing needs. Unlike a permanent t

Explain the lock based protocol, Lock Based Protocol A lock is nothing ...

Lock Based Protocol A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are t

How can you connect to the mysql server, How can you connect to the MySQL S...

How can you connect to the MySQL Server? In order to connect to the MySQL server it is necessary to give the username and password so this be able to done with The following

Data fragmentation in distributed database system, brief history,definition...

brief history,definition,current trends and future trends if any of data fragmentation

Normalization database, I need some help with my normalization database hom...

I need some help with my normalization database homework.

Explain the terms primary key, Explain the terms primary key, candidate key...

Explain the terms primary key, candidate key, alternate key and secondary key. In the given table identify every key? STUDENT(SID,Regno, Name, City) Primary Key: The prim

Define granularity and hierarchy of granularity of locks, Define granularit...

Define granularity, hierarchy of granularity of locks & multiple granularity locking. Explain the modified two phase locking along with multiple granularity locking. Ans: The s

What is trigger, What is trigger?  Triggers are statements that are exe...

What is trigger?  Triggers are statements that are executed automatically by the system as the side effect of a modification to the database.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd