Three level architecture of dbms-logical architecture, Database Management System

Three Level Architecture of DBMS or Logical DBMS Architecture

The logical architecture defines how data in the database is perceived by users. It is not deals with how the data is handled and processed by the DBMS, but only with how it looks. The process of data storage on the underlying file system is not revealed, and the users can influence the data without worrying about where it is located or how it is really stored. This results in the database having dissimilar levels of abstraction.

The majority of commercial Database Management Systems available today are based on the SPARC / ANSI generalised DBMS architecture, as proposed by the SPARC / ANSI Study Group on Data Base Management Systems. Therefore, this is also called as the SPARC / ANSI model. It separates the system into three levels of abstraction: the physical or internal level, the conceptual level, and the view or external level.

 

Posted Date: 3/5/2013 4:54:20 AM | Location : United States







Related Discussions:- Three level architecture of dbms-logical architecture, Assignment Help, Ask Question on Three level architecture of dbms-logical architecture, Get Answer, Expert's Help, Three level architecture of dbms-logical architecture Discussions

Write discussion on Three level architecture of dbms-logical architecture
Your posts are moderated
Related Questions
E-R model uses this symbol to represent weak entity set ? A Doubly outlined rectangle symbol is used to represent weak entity set.

Difference between Operating System and Database Security Security within the operating system can be executed at various levels ranging from passwords for access to system, t

Illustrate the class diagram for class room scheduling system If in any college, the number of classrooms are limited which have to be allocated to various classes and instruct

Replicating Data One approach that may support efficient access to dissimilar applications as above may be to give access to every of the applications from dissimilar replicate

Define Deadlock prevention These protocols make sure that the system will never enter a deadlock state. There are two methods to deadlock prevention. One approach makes sure t

We want have a website; we need to test the security of our website. You need to: -Try to bypass our security by simulate a website hacking -Try some hack Techniques like

When are they useful? Justify with an example. The temporary tables are commonly used to support specialized rollups or exact application processing needs. Unlike a permanent t

Explain the Object-oriented decomposition Object-oriented decomposition targets at identifying individual sovereign objects that encapsulate both a state and certain behavio

Query Processor The query language processor is responsible for taking query language statements or shifting them from the English-like syntax of the query language to a form

Differentiate sub-class and super-class? The specialization of a class is known as subclasses.eg: employee is a subclass of person and teller is a subclass of employee. Convers