Here we are going to discuss about how a user interacts with a DBMS, and how the DBMS is related to system software. Using a general-purpose programming language, user can write a source program in the normal way. However, instead of writing I/O statements of the form provided by the programming language, the programmer writes commands in a data manipulation language (DML) defined for use with the DBMS. Processor may be used to convert the DML commands into programming language statements that call DBMS routines. Using the programming language itself some DMLs are defined as a set of CALL statements. Here given are the two principal methods for user interaction with a DBMS.
- Step-1: The sequence of events begins when the DBMS is entered with the help of a call from application program A. We assume this call is a request to read data from the database. There are similar sequences of events for other types of database operations.
- Step-2: The request from program A is stated in terms of the subschema being used by A. To process a request which is being requested from program A and is stated in terms of the subschema which is being used by A, the DBMS must first examine the subschema definition.
- Step-3: Relationship between the subschema and the schema must be considered by the DBMS to interpret the request in terms of the overall logical database structure.
- Step-4: The DBMS examines the data mapping description, after determining the logical database records that must be read in terms of schema. The information regarding the need of locating the required records in the files of the database is given by this operation.
- Step-5: At this point, a logical request for a subschema record has been converted into physical requests by DBMS to read data from one or more files. These requests for file I/O are passed to the operating system using the types of service calls.
- Step-6: The operating system then issues channel and device commands to perform the necessary physical I/O operations. These I/O operations read the required records from the database into a DBMS buffer area.
- Step-7: All the data requested by the application program is present in central memory after the physical I/O operations have been completed. The DBMS accomplishes this conversion by again comparing the schema and the subschema.
- Finally, the DBMS returns control to the application program and makes available to the program a variety of status information, including any possible error indications.
For clear understanding, here is the diagram given:
DBMS (Database Management System) is a software system that enables users to define, create, maintain and control access to a database. In the context of system software, DBMS can be used in a number of ways, including:
- File Management: System software can use a DBMS to manage files, which are often stored as databases. For example, the file system of an operating system can be implemented using a DBMS to organize and manage the files on a disk.
- Data Management: System software can use a DBMS to manage data used by the system. This can include configuration data, user profiles, system logs, and other types of data that are essential for the proper functioning of the system.
- Security: DBMS can be used to manage user access to system resources. This includes authentication and authorization of users, as well as managing the permissions granted to users for accessing specific data or resources.
- Performance Optimization: System software can use a DBMS to optimize performance by efficiently managing the data used by the system. This includes techniques such as indexing, caching, and data compression.
Overall, DBMS can be a useful tool for system software developers to manage data and resources efficiently, and to ensure that the system is secure and performs well.