Yusuf Nnadi 1988 Structure and Functions of Computer Database Systems
Yusuf Nnadi 1988 Structure and Functions of Computer Database Systems
Database System
Today almost all business concerns, whether small
or big, have some kind of a database. The motor
spare parts dealer when asked for spares consults
his database, the Nigerian Airways Booking Clerk
will consult his database, i.e. the flight schedule, different departments of the organization to get
if you want to book for a flight; a company filing this information. That would be time consuming.
cabinet and the Nitel telephone directory are also But with a computerized database, he can obtain
databases. Any organized collection of informa- the required information within seconds of his re-
tion is a database. Databases are not restricted to quest from the corporate database via a terminal.
computer databases alone. Because of the volume The corporate database today is fundamental
of data in our organizations, the use of the compu- to all commercial data processing. The prolifera-
ter to store data is inevitable. In this paper, we are tion of microcomputers and the advent of
concerned with computer database systems. spreadsheet software (which is capable of answer-
A database is defined as: ing "what if" questions), have given additional
impetus to the database trend. The database has
"A computer filing system that uses a particu- come to occupy a central position in the organiza-
lar filing organization to facilitate rapid up- tion because it is related to almost every system
dating of individual records, simultaneous function and component.
updating of related records, easy access to all
records by all application programmes, and
rapid access to all stored data which must be Decision to Instal
brought together for a particular routine re-
port or inquiry or a special purpose report or The concept of the integrated database may look
inquiry." (Scott, 1986) simple, but it is among the most complex of com-
puting systems. It is necessary for management to
It follows from this definition that a database is a critically and realistically evaluate any attempt to
multi-functional computer system which or- instal a database, for not all companies require a
ganizes files in such a manner that a form of as- computer database. A decision to implement a
sociation exists between different records in the corporate database system cannot be taken in iso-
database. An individual entry of a transaction is lation because of its relationship to various func-
automatically reflected in all the other records in tions of the organization. When the database
the system that are affected by the transaction. It system was invented early in the 1970s (it was in
implies that the database is an integration of many the context of large computers), many corpora-
files. By integration we mean that the database has tions were carried away by the glamour of the new
the ability to make all files act as one. The database technology and installed the system without first
is also continuously updated to answer all unanti- ascertaining whether they really needed it. It is not
cipated queries. surprising that later, some of these corporations
A database, therefore, is a collection of in- were disappointed.
tegrated and inter-related data files, well-orga- The buyer must evaluate not only the need for
nized for multiple usage by multiple users. It is the database system, but also the capacity of the
maintained independently of the user program- system to meet his demands. The buyer must also
mes, thereby providing a rational method of ad- be clear about the result sought. Usually, the ex-
ding, updating, manipulating, and deleting prog- pected result is a central pool of information that
rammes. can constantly be updated and from which users
from different levels and units can draw data to
Corporate Asset meet their needs. This information pool should
also provide all elements for application and still
Over the past few years, companies have come to retain its independence.
realize that a corporate database is one of its most
important assets. This has increased managerial The buyer must also not underestimate the
interest in database operations. Consider the fol- cost involved in installing the system, and must
lowing example. Before accepting an order, a also appreciate that although the database has
salesman would need information on the availabi- functional flexibility, its implementation involves
lity of stock, the production schedules, the availa- substantial design rigidity.
bility of materials and so on. This information will To justify the installation of a database
enable him not only to know whether the product system, a firm should have a large number of on-
is in stock but also if it can be produced. Without a line data retrieval terminals and the ability to
database, the salesman would have to go to the write special programmes for particular informa-
38 Vikalpa
tion needs. It also requires a stable database with a cent innovations in the database system—the rela-
stable format. The stability of the format is neces- tional database—have prevented it from becom-
sary because even the simplest change may require ing one.
re-formating all data files. And this may be very
complex and expensive. When the traditional database system—
hierarchical and network—were developed, the
cost of storing data and processing were prohibi-
Structure and Functions of Database tive. It is understandable, therefore, that they were
Management Systems concerned with efficiency in the storage of data
and conservation of processing power. The
The structure of database system has changed a lot systems were also dedicated to physical location
over the years. of data. Access was by professional data proces-
sing staff through procedural computer languages,
Hierarchical Database requiring a step-by-step process of invoking and
using the system.
When the system was first introduced in the
1970s, it was hierarchical, with a branching tree Relational Database
structure. This system had some functional dif-
ficulties. Before a user could gain access to the The 1980s have brought a new database system
system, he needed to have a detailed idea of the called the Relational Database—the easiest to use
structure since it was interdependent and inter- of all the database systems. It was developed by an
related, so that any action in one sub-system IBM researcher Tedd Codd as an answer to com-
would generate some reactions in the other sub- mercial users of database who are today asking
systems. They were, therefore, used in a batch how they can use and manage the millions of in-
mode under the control of skilled- data processing structions per second that the mainframes of the
personnel. The hierarchical structure is still com- 1990s will provide.
mon today. A diagrammatic view of a hierarchical Relational database is a powerful software
database is depicted in Appendix 1. which organizes data into a table of rows and co-
lumns according to identical elements. The soft-
Network Database ware also has a dictionary organized in a relational
format used as a reference for the content of the
The hierarchical system was followed in the 1970s datapool. The system allows access to the database
by what is known as Network Database or Inter- independent of the storage and indexing techni-
related File System. This database system allowed ques. As a result, it is possible to access all records
interlinking between related items of data; thus in the computer in a random manner.
each record could have more than one parent (BIM,
1986). The network system is efficient in comput- Appendix 3 provides an illustration of the
ing; it can be used on-line. It was an improvement structure of a relational database. For example, a
over the hierarchical system in that one did not person who is five years from retirement and con-
have to wait for a batch to run before accessing tributes to the National Provident Fund (NPF) will
data. Appendix 2 provides a diagrammatic illust- have his name showing up in at least four lists in
ration of the network database. the relational database. The name will appear un-
der factory workers, male or female, NPF con-
A large number of network databases are in tributors, and, those workers who are five years
use all over the world. However, the network from retirement.
database suffers from one major drawback. The
system requires some degree of professionalism in The database is named relational because it is
data processing before it can be used. Profession- based on a predetermined relationship between
als, known as Database Administrators, have to files within a database structure and between
manage data as a resource so that maximum value fields and records in files. They are addressed by a
is gained from the database. Also, effecting fourth generation computer language, which is
changes in the system is a difficult and complex English-like. This means that the end-users can
task because a high degree of system tuning is re- have easy access to information without the
quired to maintain performance. Although the services of data processing personnel. Also, re-
network was developed as a standard database, re- trieval, storage, and manipulation functions are
40 Vikalpa
will enhance the usability of databases. growing presence of microcomputers, DBMS sup-
From the foregoing, it should be apparent that pliers are urgently looking for other markets.
the relational systems are best suited for informa- There are a variety of DBMS software being offered
tional databases, while the traditional systems fit both for mainframes and microcomputers. Their
the operational databases. However, in practice, prices range from, say, 2,000 Naira (about Rs 2,000
both requirements can be provided in the same at Rupee = Naira) for the microcomputers and up
database. to, say, one million Naira for the mainframes. In-
stallation, testing, and data transfer may cost as
much.
Database Management Systems (DBMS)
DBMS software are offered by both computer
We have presented a database system as a collec- manufacturers, as custom built to match their
tion of inter-related files, logically arranged for ac- hardware, and by independent suppliers—especi-
cess by a number of users. In this context of de- ally for IBM and its clones, and for the DEC VAX
velopment of information and data processing System. For the microcomputer, the DBMS may
technology, it is clear that databases need to im- have restricted capabilities. Because of limited
prove and undergo some changes. Also, the ex- processing power, such DBMS may have reduced
panding base of microcomputers and the develop- file access capabilities and no query language at
ment of user-friendly applications software has in- all. Examples of DBMS for the microcomputers in-
creased the demand for direct access to stored clude DBASE II and III, and DATABASE PLUS by
data. This has increased the need for a system that Ashton Tate. For the mainframes, we have INGES
ensures that changes in the database do not affect from Relational Technology Inc. (RTI), which is of
other programmes, that data files can be merged relational file type; IMS for IBM which is
without the need for re-writing the programmes, Merarchical, and IDMS from Cullinet, which is a
and that edited data is available for all applica- Network System. Others include TOTAL from
tions. Security and maintenance of integrity of Cincom, ADABAS from Software AG, and RAP-
data also become necessary with the increase in PORT from Logica. FOCUS and ORACLE are for
the frequency of direct access to databases. A soft- both the microcomputers and the mainframes.
ware system called DBMS has been developed to IBM has been extremely influential in the de-
take care of these requirements. velopment of DBMS. Software development is
Database Management Systems are generally aimed at the IBM. For instance, the latest software
described as utilities or applications software; from Cincom, the SUPRA, with nearly 250 million
they are programmes required to organize, man- Naira in development investment, and expected to
age, merge, or sort data. A DBMS manages the ac- be the first truly relational system to become com-
cess to, and manipulation of a corporate or an indi- mercially available for the MS-DOS system envi-
vidual's database, assuring at the same time, the ronment is aimed at IBM.
independence of data in the database. In essence,
provision is made for sharing of data among many Selecting Software
applications. Additionally, the DBMS performs
the function of ensuring data integrity and data Because of the cost involved in developing a
security. We shall now consider the DBMS soft- DBMS and problems of compatibility between the
ware available and the steps required to be fol- system and computers, it is necessary that the
lowed while purchasing or installing them, and selection, testing, and implementation of the
explain the intricacies involved in ensuring the system is done by professionals. While choosing a
security and integrity of data in the context of the DBMS, there are factors other than cost that need
role of a DBMS. to be considered. Logically, the system cannot be
selected before defining the objectives for which it
DBMS Software is needed. At the same time, organizational objec-
tives should not be changed to suit a particular
Originally, DBMS was intended for monitoring a DBMS. It should be the other way round. The re-
large volume of data. The implication of this was quirements that need to be evaluated while choos-
that it could be used on large mainframe comput- ing the system can broadly be divided into two
ers only. However, with the number of operating categories—general requirements and special re-
mainframes on the decline, coupled with the fast quirements.
42 Vikalpa
is particularly tied to the increase in the number of Conclusion
non-professional system users.
We believe that database technology will dramati-
How can these problems be alleviated? The cally influence managerial practices. Database
techniques and processes for ensuring the security systems increase data accessibility thereby trans-
and maintaining the integrity of data are related. forming managerial modes of operation. With a
However, maintaining integrity has a broader database, a manager can react to critical events
scope as it is aimed at guarding the database even quickly with actions based on full information. He
from friendly users while security measures are can also recognize and respond to changing situa-
designed to prevent illegal use of the database tions more effectively. Today's managers should,
only. therefore, address themselves to this new techno-
logy as a means of improving their managerial
To ensure the security of the database, the systems.
DBMS software usually incorporate features that
control access like the password, a means of au- References
thenticating the identity and security rating of the
user. So, if somebody wants to use a database, he HIM (1986). "Data Management Supplement," Management
must have an officially granted password by the Today, March.
appropriate authorities. Before the user can get ac- Dale, C J (1977) An Introduction to Database Systems. Read-
cess, he must provide his password when de- ing, Mass: Addison-Wesley, Second Edition.
manded by the system. The genuineness of the Martin, J (1972). Security, Accuracy, and Privacy in Computer
password will be verified by the system and clear- Systems. Englewood Cliffs, NJ: Prentice-Hall.
ance to use the application programmes and data Scott, G M (1986). Principles of Management Information
files may be granted or withheld. System. New York: McGraw-Hill.
Sharpe, R (1987). "Developing Relationship," Management
The DBMS also restricts access to various Today, December.
levels of information and stipulates what can be Weldon, J (1980). "Maintaining Database Integrity," Working
done at these levels—whether read or write only, Paper Series, CRIS, New York University.
shared or unshared or modify data only.
Usernames are usually given to allow the system
to know what sorts of information and functions
could be provided to the user. The username also
prevents users from breaking into other people's
files. As part of the security procedures, the DBMS
also records type of access granted to users, data
source, etc.
Weldon (1980) has presented two techniques
for the maintenance of data integrity: validation
and consistency. Validation is a procedure of data
and processing control within the system that
checks the accuracy of data. It is designed prima-
rily to prevent the feeding of wrong information to
the databases, by editing all entering data and re-
jecting those found unacceptable. To ensure the
consistency of a database, measures must be emp-
loyed to forestall system failures and introduce
some provision for the recovery of the database
when such failures occur. It is, therefore, neces-
sary that businesses with a database system must
have a back-up which can facilitate the retrieval of
data in the minimum amount of time and with
minimum overheads after a failure. Most DBMS
packages have features that guard, validate, and
recover database as outlined above.
Customers
Company Product
Design Budget
Purchase Supply
Sales Advert