Architecture of Database Systems http://www.tutorialspoint.com/dbms/relational_algebra.htm

Architecture of Database Systems

 

12.1 Introduction
Software systems generally have an architecture, ie. possessing of a structure (form) and organisation (function). The former describes identifiable components and how they relate to one another structurally; the latter describes how the functions of the various structural components interact to provide the overall functionality of the system as a whole. Since a database system is basically a software system (albeit complex), it too possesses an architecture. A typical architecture must define a particular configuration of and interaction between data, software modules, meta-data, interfaces and languages (see Figure 12-1).
The architecture of a database system determines its capability, reliability, effectiveness and efficiency in meeting user requirements. But besides the visible functions seen through some data manipulation language, a good database architecture should provide:
    a) Independence of data and programs
    b) Ease of system design
    c) Ease of programming
    d) Powerful query facilities
    e) Protection of data

Figure 12-1: General database system architecture
The features listed above become especially important in large organisations where corporate data are held centrally. In such situations, no single user department has responsibility over, nor can they be expected to know about, all of the organisation’s data. This becomes the job of a Database Administrator (DBA) who has a daunting range of responsibilities that include creating, expanding, protecting and maintaining the integrity of all data while adressing the interests of different present and future user communities. To create a database, a DBA has to analyse and assess the data requirements of all users and from these determine its logical structure (database schema). This, on the one hand, will need to be efficiently mapped onto a physical structure that optimises retrieval performance and the use of storage. On the other, it would also have to be mapped to multiple user views suited to the respective user applications. For large databases, DBA functions will in fact require the full time services of a team of many people. A good database architecture should have features that can significantly facilitate these activities.
12.2 Data Abstraction
To meet the requirements above, a more sophisticated architecture is in fact used, providing a number of levels of data abstraction or data definition. The database schema, also known as Conceptual Schema, mentioned above represents an information model at the logical level of data definition. At this level, we abstract out details like computer storage structures, their restrictions, or their operational efficiencies. The view of a database as a collection of relations or tables, each with fixed attributes and primary keys ranging over given domains, is an example of a logical level of data definition.
The details of efficiently organising and storing objects of the conceptual schema in computers with particular hardware configurations are dealt with at the internal (storage) level of data definition. This level is also referred to as the Internal Schema. It maps the contents of the conceptual schema onto structures representing tuples, associated key organisations and indexes, etc, taking into account application characteristics and restrictions of a given computer system. That is, the DBA describes at this level how objects of the conceptual schema are actually organised in a computer. Figure 12-2 illustrates these two levels of data definition.

Figure 12-2: The logical and internal levels of data abstraction
At a higher level of abstraction, objects from the conceptual schema are mapped onto views seen by end-users of the database. Such views are also referred to as External Schemas. An external schema presents only those aspects of the conceptual schema that are relevant to the particular application at hand, abstracting out all other detaiils. Thus, depending on the requirements of the application, the view may be organised differently from that in the conceptual schema, eg. some tables may be merged, attributes may be suppressed, etc. There may thus be many views created - one for each type of application. In contrast, there is only one conceptual and one internal schema. All views are derived from the same conceptual schema. This is illustrated in Figure 12-3 which shows two different user views derived from the same conceptual schema.
Thus, modern database systems support three levels of data abstraction: External Schemas (User Views), Conceptual Schema, and Internal (Storage) Schema.
The DDL we discussed in earlier chapters is basically a tool only for conceptual schema definition. The DBA will therefore usually need special languages to handle the external and internal schema definitions. The internal schema definition, however, varies widely over different implementation platforms, ie. there are few common principles for such definition. We will therefore say little more about them in this book.

Figure 12-3: User views (external schema)
As to external schema definitions, note that in the relational model, the Data Sub- Languages can be used to both describe and manipulate data. This is because the expressions of a Data Sub-Language themselves denote relations. Thus, a collection of new (derived) relations can be defined as an external schema.
For example, suppose the following relations are defined:
    Customer( C#, Cname, Ccity, Cphone )
    Product( P#, Pname, Price )
    Transaction( C#, P#, Date, Qnt )
We can then define an external view with a construct like the following:
    Define View My_Transaction_1 As
      Select Cname, Ccity, Date, Total_Sum=Price*Qnt From Customer, Transaction, Product Where Customer.C# = Transaction.C# & Transaction.P# = Product.P#
which defines the relation (view):
    My_Transaction_1( Cname, Ccity, Date, Total_Sum )
This definition effectively maps the conceptual database structure into a form more convenient for a particular user or application. The extension of this derived table is itself derived from the extensions of the source relations. This is illustrated in Figure 12-4 below.

Figure 12-4: External view definition
This is a very important property of the relational data model: a unified approach to data definition and data manipulation.
12.3 Data Administration
Functions of a DBA include:
  1. Creation of the database
    To create a database, a DBA has to analyse and assess the requirements of the users and from these determine its logical structure. In other words, the DBA has to design a conceptual schema and a first variant of an internal schema. When the internal schema is ready, the DBA must load the database with actual data.
  2. Acting as intermediary between users and the database
    A DBA is responsible for all user facilities determined by external schemas, ie. the DBA is responsible for defining all external schemas or user views.
  3. Ensuring data privacy, integrity and security
    In analysing user requirements, a DBA must determine who should have access to which data and subsequently arrange for appropriate privacy locks (passwords) for identified individuals and/or groups. The DBA must also determine integrity constraints and arrange for appropriate data validation to ensure that such constraints are never violated. Last, but not least, the DBA must make arrangements for data to be regularly backed up and stored in a safe place as a measure against unrecoverable data losses for one reason or another.
At first glance, it may seem that a database can be developed using the conventional "waterfall" technique. That is, the development process is a sequence of stages, with work progressing from one stage to the next only when the preceding stage has been completed. For relational database development, this sequence will include stages like eliciting user requirements, analysing data relationships, designing the conceptual schema, designing the internal schema, loading the database, defining user views and interfaces, etc, through to the deployment of user facilities and database operations. In practice, however, when users start to work with the database, the initial requirements inevitably change for a number of reasons including experience gained, a growing amount of data to be processed, and, in this fast changing world, changes in the nature of the business it supports. Thus, a database need to evolve, learning from experience and allowing for changes in requirements. In particular, we may expect periodic changes to:
  1. improve database performance as data usage patterns changes or becomes clearer
  2. add new applications to meet new processing requirements
  3. modify the conceptual schema as understanding of the enterprise’s perception of data improves
Changing a database, once the conceptual and internal schemas have been defined and data actually loaded, can be a major undertaking even for seemingly small conceptual changes. This is because the data structures at the storage layer will need to be reorganised, perhaps involving complete regeneration of the database. A good DBMS should therefore provide facilities to modify a database with a minimum of inconvenience. The desired facilities can perhaps be broadly described to cover:
  • performance monitoring
  • database reorganisation
  • database restructuring
By performance monitoring we mean the collection of usage statistics and their analysis. Statistics necessary for performance optimisation generally fall under two headings: static and dynamic statistics. The static statistics refer to the general state of the database and can be collected by special monitoring programs when the database is inactive. Examples of such data include the number of tuples per relation, the population of domains, the distribution of relations over available storage space, etc. The dynamic statistics refer to run-time characteristics and can be collected only when the database is running. Examples include frequency of access to and updating of each relation and domain, use of each type of data manipulation operator and associated response times, frequency of disk access for different usage types, etc. It is the DBA’s responsibility to analyse such data, interpret them and where necessary take steps to reorganise the storage schema to optimise performance. Reorganising the storage schema also entails the subsequent physical reorganisation of the data themselves. This is what we mean by database reorganisation.
The restructuring of the conceptual schema implies changing its contents, such as:
  • adding/removing data items (ie. columns of a relation)
  • adding/removing entire relations
  • splitting/recombining relations
  • changing a relation’s primary keys
  • etc
For example, assuming the relations as on page 3, suppose we now wish to record also for each purchase transaction the sales representative responsible for the sale. We will need therefore to add a column into the Transaction relation, say with column name R# :
    Transaction( C#, P#, R# , Date, Qnt ) : new attribute added
The intention, of course, is to record a unique value under this column to denote a particular sales representative. Details of such sales representatives will then be given in a new relation:
    Representative( R#, Rname, Rcity, Rphone)
A retructured conceptual schema will normally be followed by a database reorganisation in the sense explained above. 12.4 Data Independence
Data independence refers to the independence of one user view (external schema) with respect to others. A high degree of independence is desirable as it will allow a DBA to change one view, to meet new requirements and/or to optimise performance, without affecting other views. Relational databases with appropriate relational sub-languages have a high degree of data independence.
For example, suppose that the view
    My_Transaction_1( Cname, Ccity, Date, Total_Sum )
as defined before no longer meet the user’s needs. Let’s say that Ccity and Date are no longer important, and that it is more important to know the product name and quantity purchased. This change is easily accommodated by changing the select- clause in the definition thus:
Define View My_Transaction_1 As
Select Cname,
Pname , Qnt, Total_Sum=Price*Qnt
From Customer, Transaction, Product
Where Customer.C# = Transaction.C#
& Transaction.P# = Product.P#
Pname replaces the original specification of Ccity and Date items
If each view is defined separately over the conceptual schema, then as long as the conceptual schema does not change, a view may be redefined without affecting other views. Thus the above change will have no effect on other views, unless they were built upon My_Transaction_1.
Data independence is also used to refer to the independence of user views relative to the conceptual schema. For example, the reader can verify that the change in the conceptual schema in the last section (adding the attribute R# to Transaction and adding the new relation Representative), does not affect My_Transaction_1 - neither the original nor the changed view!. In general, if the relations and attributes referred to in a view definition are not removed in a restructuring, the view will not be affected. Thus we can accommodate new (additive) requirements without affecting existing applications.
Lastly, data independence may also refer to the extent to which we may change the storage schema without affecting the conceptual or external schemas. We will not elaborate on this as we have pointed out earlier that the storage level is too diverse for meaningful treatment here.
12.5 Data Protection
There are generally three types of data protection that any serious DBMS must provide. These were briefly described in Chapter 1 and we summarise them here:
    1. Authorisational Security
    This refers to protection against unauthorised access and includes measures such as user identification and password control, privacy keys, etc.
    2. Operational Security
    This refers to maintaining the integrity of data, ie. protecting the database from the introduction of data that would violate identified integrity constraints.
    3. Physical Security
    This refers to procedures to protect the physical data against accidental loss or damage of storage equipment, theft, natural disaster, etc. It will typically involve making periodic backup copies of the database, transaction journalling, error recovery techniques, etc.
In the context of the relational data model, we can use relational calculus as a notation to define integrity constraints, ie. we define them as formulae of relational calculus. In this case, however, all variables must be bound variables as we are specifying properties over their ranges rather than looking for particular instantiations satisfying some predicate. For example, suppose that for the Product relation, the Price attribute should only have a value greater than 100 and less than 99999. This can be expressed (in DSL Alpha style) as:
    Range Product X ALL;
    (X.Price > 100 & X.Price < 99999 )
This is interpreted as an assertion that must always be true. Any data manipulation that would make it false would be disallowed (typically generating messages informing the user of the violation). Thus, not only does the relational data model unify data definition and manipulation, but its control as well. In the area of physical security, database backups should of course be done periodically. For this purpose, it is perhaps best to view a database as a large set of physical pages, where each page is a block of fixed size serving as the basic unit of interaction between the DBMS and storage devices. A database backup is thus essentially a copy of the entire set of pages onto another storage medium that is kept in a secure and safe place. Aside from the obvious need for backups against damage of storage devices, theft, natural disasters and the like, backups are necessary to recover a consistent database in the event of a database "crash". Such crashes can occur in the course of a sequence of database transactions, particularly transactions that modify the database content.
Suppose, for example, that the last backup was done at time t0, and subsequent to that, a number of update transactions were applied one after another. Suppose further that the first n transactions were successfully completed, but during the (n+1)th transaction a system failure occurred (eg. disk malfunction, operating system crash, power failure, etc) leaving some pages in a corrupted state.
In general, it is not possible to just reapply the failed transaction - the failure could have corrupted the updates performed by previous transactions as well, or worse, it could have damaged the integrity of the storage model as to make some pages of the database unreadable! We have no recourse at this point but to go back to the last known consistent state of the database at time t0, ie. the entire contents of the last backup is reinstated as the current database. Of course, in doing so, all the transactions applied after t0 are lost.
At this point it may seem reasonable that, to guard against losing too much work, backups should perhaps be done after each transaction - then at most only the work of one transaction is lost in case of failure. However, many database applications today are transaction intensive typically involving many online users generating many transactions frequently (eg. online airline reservation system). Many databases, on the other hand, are very large and an entire backup could take hours to complete. While backup is being performed the database must be inactive. Thus, it should be clear that this proposition is impractical.
As it is clearly desirable that transactions since the last backup are also somehow saved in the event of crashes, an additional mechanism is needed. Essentially, such mechanisms are based on journalling successful transactions applied to a database. This simply means that a copy of each transaction (or affected pages) is recorded in a sequential file as they are applied to the database.
The simplest type of journalling is the Forward System Journal. In this, whenever a page is modified, a copy of the modified page is also simultaneously recorded into the forward journal.
To illustrate this mechanism, let the set of pages in a database be P = {p1, p2, ... pn}. If the application of an update transaction T on the database changes PT, where PT Í P, then T(PT) will be recorded in the forward journal. We use the notation T(PT) to denote the set of pages PT after the transaction T has changed each page in PT. Likewise, we write T(pi) to denote a page pi after it has been changed by transaction T. Furthermore, if T was applied successfully (ie. no crash during its processing), a separator mark, say ‘;’, would be written to the journal. Thus, after a number of successful transactions, the journal would look as follows:
< T(PT1) ; T(PT2) ; ... T(PTk) ; >
As a more concrete example, suppose transaction
  • T1 changed {p1, p2, p3},
  • T2 changed {p2, p3, p4}, and
  • T3 changed {p3, p4, p5},
in that order and all successfully carried out. Then the journal would contain: < T1( {p1, p2, p3} ) ; T2( {T1(p2), T1(p3), p4} ) ; T3( {T2(T1(p3)), T2(p4), p5} ) ; >
Now suppose a crash occurred just after T3 has been applied. The recovery procedure consists of two steps:
  1. replace the database with the latest backup
  2. read the system journal in the forward direction (hence the term ‘forward’ journal) and, for each set of journal pages that precedes the separator ‘;’, use it to replace the corresponding pages in the database.
Effectively, this duplicates the effect of applying transactions in the order they were applied prior to the crash. The technique is applicable even if the crash occurred during the last transaction. In this case, the journal for the last transaction would be incomplete and, in particular, the separator ‘;’ would not be written out. Say that transaction T3 was interrupted after modifying pages p3 and p4 but before it could complete modifying p5. Then the journal would look as follows:
    < T1( {p1, p2, p3} ) ; T2( {T1(p2), T1(p3), p4} ) ; T3( {T2(T1(p3)), T2(p4), ...} ) >
In this case, recovery is exactly as described above except that the last incomplete block of changes will be ignored (no separator ‘;’). Of course, the work of the last transaction is lost, but this is unavoidable. It is possible, however, to augment the scheme further by saving the transaction itself until its effects are completely written to the journal. Then T3 above can be reapplied, as a third step in the recovery procedure. While the forward journal can recover (almost) fully from a crash, its disadvantage is that it is still a relatively slow process - hundreds or even thousands of transactions may have been applied since the last full backup, and the corresponding journals of each of these transactions must be copied back in sequence to restore the state of the database. In some applications, very fast recovery is needed.
In these cases, the Backward System Journal will be the more appropriate journalling and recovery technique. With this technique, whenever a transaction changes a page, the page contents before the update is saved. As before, if the transaction succesfully completes, a separator is written. Thus the backward journal for the same example as above would be:
    <{ p1, p2, p3} ; { T1(p2), T1(p3), p4} ; { T2(T1(p3)), T2(p4), ...} >
Since each block of journal pages represents the state immediately before a transaction is applied, recovery consists of only one step: read the journal in the backward direction until the first separator and replace the pages in the database with the corresponding pages read from the journal. Thus, the backward journal is like an ‘undo’ file - the last block cancels the last transaction, the second last cancels the second last transaction, etc. Features such as those discussed above can significantly facilitate the management of corporate data resources. Such features, together with the overall architecture and the Data Model examined in previous chapters, determine the quality of a DBMS and are thus often used as part of the principal criteria used in critical evaluation of competing DBMSs.

12.6 Further Reading
Those of you wanting a more detailed introduction to the relational data model, are strongly recommended to read [Date 1995]. The book is written in a tutorial style with many of the issues, such as the database languages, presented through a progressive series of examples. Another book by the same author [Date 1993] is a readable account of the SQL standard. The book contains many examples and a reader can learn enough to be able to write simple SQL programs or to understand an existing program.
The books [Kroenke 1995], [Benyon 1997] and [Ullmann & Widom1997] are written in a similar tutorial style and describe the Relational Data Model in greater detail providing useful recommendations on actual database design.
Database theory is well presented in [Elmaseri and Navathe 1994] and [Ullmann 1988].
The book [Smith & Barnes 1987] bridges the gap between physical data structures and logical database models. Assuming knowledge of elementary data structures, it describes file processing techniques and introduces fundamentals of database systems as you become aware of design and implementation issues.
The book [Silverston, Inmon, and Graziano 1997] can be useful for those who are interested in the actual application of database systems. It provides a common set of database structures for specific functions common to most businesses, such as sales, marketing, order processing, budgeting, and accounting. The book presents and discusses in greater details different design and implementation techniques. Readers can apply one of such data structures to their own company to meet specific data needs.
References:
[Benyon 1997] Benyon D. Information and Data-Modelling (2nd. Edition), Mc Graw Hill (1997).
[Date 1995] Date, C.J. Introduction to Database Systems (6th Edition), Addison- Wesley Publ. company (1995).
[Date 1993] Date, C.J. A Guide to the SQL Standard. (3rd Edition), Addison-Wesley Publ. company (1993).
[Elmaseri and Navathe 1994] Elmaseri, K. and Navathe, D. Fundamentals of Database Systems (2nd. Edition), Benjamin / Cumming (1994).
[Kroenke 1995] Kroenke D.M. Database Processing. (5th. Edition), Prentice Hall (1995).
[Silverston, Inmon, and Graziano 1997] Silverston L., Inmon W. H. and Graziano K. The Data Model Resource Book: A Library of Logical Data Models and Data Warehouse Designs, John Willey & Sons (1997).
[Smith & Barnes 1987] Smith, P.D. and Barnes, M.G. Files and Databases: An Introduction, Addison-Wesley Publ. company (1987).
[Ullmann 1988] Ullmann, J.D. Principles Of Database and Knowledge-Base Systems, Volume I: Classical Database Systems, Computer Science Press (1988).
[Ullmann & Widom1997] Ullmann, J.D. and Widom, S. A First Course in Database Systems, Prentice Hall (1997).

No comments:

Bollywood Hot Photo Gallery

 

Other Posts >>

Transforming Numerical Systems (5) What is (3) Features (2) "मैग्नेटिक हिल" साइंस के पास भी नहीं है जवाब (1) '43 (1) 'घाघरा' गाने पर इस बाला के ठुमके देख माधुरी भी रह जाएंगी दंग (1) 10 Amazing Animal Disguises (w/ video) (1) 10 Point Checklist for creating a WordPress Theme (1) 10 Ways to Get Traffic for Free (1) 10 ऐसे क्रिकेटर जो खेलते-खेलते मैदान से ही दुनिया छोड़ गये (1) 1000 से ज्यादा लोगों को कोर्ट में घसीटा (1) 2 मुंह वाला सांप (1) 20 Creepiest Ghost (1) 200' बार हुआ युवती से रेप (1) 25 हजार रुपये में ओला में रजिस्‍टर करें (1) 302/Day And You Will Not Believe How He's Doing It! India News investigates Work From Home Opportunities. (1) 33 साल पुराने मर्डर का रहस्य खुला जब खूनी ने खुद फ़ोन कर के अपना जुर्म कबूला (1) 4 साल में देश के 11 परमाणु वैज्ञानिकों की संदिग्ध हालात में मौत (1) 40 Magic Tricks in 4 Minutes - Day 279 of 365 (1) 4G से मत होइए खुश (1) 4जी की 10 जरूरी बातें जो आपको भी जाननी चाहिए (1) 5 Prestashop Theme Generators (1) 5 जगहों से जुड़े सच जानकर आपके रोंगटे खड़े हो जाएंगे (1) 5 बातें और हर लड़की आपके पीछे आएगी (1) 8 Ways to Spot a Liar (1) 8085 Microprocessor (1) ADBMS (1) Aishwarya Rai Photos Gallery (1) Aishwarya Rai Sexy look (1) Alia bhatt Bollywood Actress Hot Images (1) All Banks Official Missed call balance enquiry number (1) Amazing Magic Show: One Of The Best Magic Shows (1) Amisha Patel Hottest Photos (1) Amitabh Bachchan (1) Architechture of 8085 (1) Architecture of Database Systems (1) Artisteer 4.2 RC v4.2.0 build 60559... (1) Ayesha takia Bollywood Actress Hot Images (1) BREAKING NEWS: New Delhi Man Makes Rs.6 (1) Best Answer to explain OOPS (1) Best Free WordPress Hosting options (1) Best Love Shayari (1) Best Tool for Freelancers in Web Development (1) Binary 2 Decimal (1) Binary Numbers (1) Blog Directories To Submit Your Blog for geting traffic (1) Bollywood Actress Bipasha Basu Romantic Photos (1) Bollywood Actress Kareena Kapoor Hot Photos (1) Bollywood Actress Sonam Kapoor Hot Photos (1) Boost WiFi Modem speed (1) Browser (1) C++ Program To display the half pyramid of * (1) Casting Director: Dharmendra K. (1) Choosing an Internet service (1) Configure Your PC to a Local Area Network (1) Create your own Ethernet cables with this simple training (1) DBMS Architecture (1) DBMS Concurrency Control (1) DBMS Normalization (1) Data Warehouse Design Approaches (1) Decimal 2 Binary (1) Decimal 2 Decimal Transforming Numerical Systems (1) Decimal 2 Hexadecimal (1) Decimal System (1) Differences or Compare Data Warehouse database and OLTP database? (1) Discus (1) Discuss the top down vs bottom up approach to data warehouse (1) Display ads and Make Money (1) Download Artisteer 4.3 Full Version + Keygen Crack Patch (1) E-mail (1) ER Diagram Representation (1) Easy Magic Tricks for Everyone (1) Email Messages (1) Email protocols: POP (1) English Hindi Vocabulary…. (1) Example (1) Explain The structure of E-mail addresss ? (1) Explain various protocols used in E-mails (1) FREE SMS collection... “You only live once (1) FREE WordPress Plugins (1) Features and types (1) Features of Java Programming Language (1) First live video at Facebook head quarter by Facebook CEO Mark Zuckerberg (1) Free Acting Audition In Ajmer (1) Funny Pictures (1) General Post Office(GPO) (1) Ghost Photos (1) Hansika motwani latest hot unseen photos (1) Hardware needed (1) Hex 2 Binary 2 Octal Transforming Numerical Systems (1) Hexadecimal 2 Decimal Transforming Numerical Systems (1) Hot & Sexy Wallpaper (1) Hot Photos and Wallpapers (1) How To Submit Blogger Sitemap To Google Webmaster Tools? (1) How a Browser Retrieves a Web Page (1) How do I connect to the Internet (1) How do I disable the video autoplay ? (1) How to Get Free Wi-Fi Access Anywhere (1) How to Hack Wi-Fi Passwords (1) How to Make Money Online with Google Adsense (1) How to Make Popcorn at Home (1) How to Make a Website without Learning HTML and CSS (1) How to Make an Ethernet Cable - Cat5 (1) How to Read Minds (1) How to Spot a Liar (1) How to get Traffic from Social Bookmarking sites (1) How to register a free domain name? (1) IMAP and MAPI (1) ISO 32 Bit and 64 Bit 2015 (1) ISP (1) Indian girls in saree (1) Indian glamour actress sunny leone hot Images-Sexy Wallpapers (1) Internet Service Provider (1) Is data warehouse normalized or denormalized (1) Java characteristics & features (1) Kajol (1) Kangna Ranaut Indian Actress hot Wallpapers Pictures (1) Katrina Kaif Hot Photo (1) Katrina Kaif Images (1) Katrina Kaif Pics (1) Katrina Kaif Pictures (1) Katrina Kaif Sexy Photos (1) Katrina Wallpapers (1) Keyboard (1) Latest Hot Photos of Sonakshi Sinha ~ Bollywood (1) Local Area Network (1) Lose 3 kgs of Stomach Fat EVERY Week with Just 2 Diet Tips. Bollywood Stars use this simple trick to melt fat off their bodies! (1) Love (1) Lucknow (1) MMC Console Window Keyboard (1) Madhuri Dixit Hot Sexy Photo Gallery (1) Make free internet calls (1) Mallika Sherawat Photo Gallery (1) Mars planet facts news & images (1) Most Beautiful Photos of Deepika Padukone (1) NASA confirms that liquid water flows on Mars (1) Nasa scientists find evidence of flowing water on Mars (1) Negative Binary Numbers (1) OOPS Concept (1) Octal System (1) Online transaction processing (1) Open X Ad Server (1) PHP Script. (1) PHP-based online shopping cart (1) Phir Jee Le Zara Ye Zindagi (1) Photos (1) Photos For Smile (1) Pics ... (1) Priyanka chopra bollywood (1) Programming Language (1) Protect Your Facebook Account from Spam and Scams (1) Protect Your WordPress Website against Spamming (1) RARE PHOTOS (1) RJ45 Connectors (1) Rani Mukherjee Hot Sexy Bikini Images (1) Rare Bollywood Pics You’ve Never Seen! Part (1) Reasons for creating a data mart (1) Relational Algebra (1) SEXY भारतीय लड़किया साड़ी में (1) Sexy Bollywood Actress Anushka Sharma Hot Pics (1) Sexy Celina Jaitley Photos and Pictures (1) Sexy Photos Gallery (1) Shayari Collections (1) Shayari on Human Feeling (1) Shortcuts (1) Speech In English / Hindi (1) Sri Divya Latest Hot Stills (1) Stills (1) Sweet and Sexy Pics Of Bollywood Actress Shilpa Shetty ... (1) Switching from decimal to binary numbers (1) TAX saving (1) TELNET (1) TELecommunication NETwork (1) Teachers' Day (1) Thank you teacher (1) Top 5 Animation/VFX Tools of the Year (1) Top 5 Joomla Template Generators (1) Top Sexy Pictures of Preity Zinta (1) Toshiba launches Android-powered TV (1) Uniform Resource Locator (1) Unity 4.6.1 Final + Patch Free Download (1) Untold stories of postmortem room (1) VFX (1) Very Sad Love Shayari for Broken Heart हिंदी में ... (1) Video Full video (1) Vidya balan bollywood actress hot and sexy image gallery (1) Web (1) What are the responsibilities of a data warehouse project manager? (1) What do you understand by Business intelligence (1) What do you understand by OLTP ? (1) What is FTP (1) What is GOPHER ? (1) What is a Search Engine? (1) What is a Web Browser (1) What is the Data mart (1) Which CMS is best as Content Manager ? (1) While You’re in Your 20s (1) Why (1) Why To Use Content Management System ? (1) Why You Hate the Sound of Your Own Voice (1) Windows 10 All Editions (1) Windows 10 Free Download (1) Wish you a Happy Teachers Day. (1) Wordpress Plugins (1) Xara Web Designer Premium v9.2.3.29638 (x32bit / x64bit) Full With Crack (1) Xender For PC free download Windows XP/7/8/8.1 (1) and how do I use it to transfer files? (1) bollywood actress (1) bollywood actress hot and sexy image gallery (1) but if you do it right (1) ca (1) data-warehouse (1) denormalization process for creating data warehouse (1) designs (1) explain with example (1) fb (1) form (1) ftp (1) hot indian bride pictures (1) hot alia bhatt (1) hot and sexy photos (1) hot sexy indian actress (1) how-attract-shy-girl-dating (1) indian (1) information life cycle management (ILM) definition (1) java (1) latest (1) learn english (1) linux (1) mehndi (1) mysql (1) numbers and character C++ Program to print half pyramid as using * as shown in figure below. (1) once is enough.” “In three words I can sum up everything I've (1) online dating tips (1) or OLTP (1) ost (1) php (1) pics and wallpapers collection ... (1) save tax (1) shah rukh khan house (1) spoken English (1) structure (1) the concept of information life cycle (1) tips-for-save-internet-data-pack (1) top down vs bottom up (1) trans (1) types of Database Users in Oracle or data base (1) watch Magic..Video (1) webking (1) webking host (1) website hosting cheep hosting (1) what is ISP (1) what is url (1) windows 10 key (1) www.webkinghost.in (1) you have never seen (1) अगर लड़की को हुआ है आपसे प्‍यार तो करेगी ये चीज़ें (1) अगले जन्म में क्या होंगे (1) अब मात्र 45 मिनट में बनेगा पासपोर्ट जानिए कैसे? (1) अभिनव से श्वेता ने की थी दूसरी शादी (1) अमेरिकी स्‍पेस एजेंसी नासा (1) अस्पताल जहां भूत-प्रेत करते हैं इलाज (1) आ रही है (1) आंखो की रोशनी बढ़ाने के 10 टिप्स (1) आत्माओं से बात करने का चौथा तरीका आप भी जानिए.. (1) आत्माओं से बात करने का तीसरा तरीका आप भी जानिए.. (1) आत्माओं से बात करने का दूसरा तरीका आप भी जानिए.. (1) आत्माओं से बात करने का पहला तरीका आप भी जानिए... (1) आत्माओं से बात करने का पांचवां तरीका आप भी जानिए.. (1) आत्माओं से बात करने के सरल तरीके आप भी जानिए... (1) आदमी की पर्सनालिटी उसके (1) आपबीती (1) इन देशों में चल रहा है 10G (1) इन महिलाओं के इशारे पर नाचता था अंडरवर्ल्ड. (1) इस झील में बहता है झाग (1) इस तरह से पता चलता है कि होने वाली हैं आपकी मौत... (1) उबालने पर दोगुना पोषण देंगी यह 10 सब्जियां (1) ऊप्स: एक ही समय में दीपिका की इतनी अदाएं (1) एक सैनिक की आत्मा जो कर रही 50 साल से देश की रक्षा (1) एकसाथ भेजें मेसेज (1) एमेजॉन (1) ऐसे पार्टनर ढ़ूंढ़ती हैं महिलाएं (1) ऐसे बढ़ाएं अपनी सेविंग (1) ऑनलाइन डेटिंग के लिये 5 टिप्‍स (1) काला नहीं हरा जादू है VFX (1) कुंभ (1) कुरुक्षेत्र (1) कैसे पाएं निजात मुंहासों से (1) क्या आप जानते है (1) क्रिकेट इतिहास के वे सुनहरे पल (1) खुलेआम हो रही है लूट (1) गंजेपन का नया इलाज (1) गले लगकर सोने के लिए 1 घंटे में लेती हैं 3 हजार रुपये (1) घड़ी बनाकर गिरफ्तार हुए छात्र ने छोड़ा अमेरिका (1) घर की गरीबी ने बना दिया था बार डांसर (1) घर-परिवार में झगड़ों का कारण बनते हैं ये 9 वास्तु दोष (1) चल रहा है 10G internet (1) चेहरे की चमक बढ़ाने के लिए (1) जानने के लिए जरूर पढ़ें (1) जानवरों को इंसानों से ज़्यादा फ़ोटो खिंचवाने का शौक (1) जानिए VFX की हकीकत (1) जानिए कैसे... (1) जानें कब पढ़ा गया आपका मेसेज (1) जुगाड़ के तो भईया हम ही हैं किंग (1) जो बन गए बेहद खास (1) टैक्स छूट पाने के हैं कई रास्ते (1) ट्रीटमेंट के 10 दिन बाद शुरू हो जाएगी बालों की ग्रोथ (1) डिलीट हुए मेसेज वापस पाएं (1) तीन साल बाद कार आपकी (1) तुलसी (1) तुलसी किस तरह (1) थप्पड़ मारती है आत्मा (1) दिमाग भी लेता है सांस (1) दीपावली (1) दुनिया का पहला अमर इंसान (1) दुनिया की ‘सबसे सेक्सी महिला’ (1) देखिए लोट-पोट करती तस्वीरें (1) नागा साधु (1) निराशा से निकलने और खुद को motivate करने के 16 तरीके (1) पत्नी का आरोप (1) पब्लिक ट्रांसपोर्ट में कैसे नमूने सफ़र करते हैं (1) पहली बार किसी लड़की से बात कैसे करें (1) पहली बार लड़कियाँ लड़को में क्या देखती हैं ? (1) पार्टनर के साथ ईजी हो जाएगी लाइफ (1) पूर्व जन्म में क्या थे (1) पेन ड्राइव से करें डाटा रिकवरी (1) पोस्टमॉर्टम रूम के भीतर की सच्चाई क्या है (1) पढ़ें ये टिप्स (1) फ्री मिलेगा यह फोन (1) बना दिया प्राइवेट पार्ट (1) बस के सामने दिखा भूत! फोटो हुई वायरल (1) बिग बी (1) बिग बी (Amitabh Bachchan) की लाइफ के RARE PHOTOS (1) बिना VISA 59 देशों में ट्रैवल (1) बिना मेकअप ऐसी नजर आती हैं बॉलीवुड एक्ट्रेसेस (1) बिना सिम के कैसे एक और फ़ोन नंबर रखें (1) बियर के खाली कैन से भी ऐसे बढ़ाई जा सकती है WIFI मॉडम की स्पीड... (1) बुजुर्ग की पिटाई कर टाइपराइटर तोड़ने वाला दारोगा (1) भारतीय दुल्हन (1) मंगल ग्रह पर बहता पानी होने के संकेत (1) मंगेतर ने न्यूड सेल्फ़ी भेजने से किया इंकार तो लड़के ने तोड़ी शादी (1) मछुआरे और मगरमच्छ में अनूठी दोस्ती बच्चों की तरह मगरमच्छ के साथ खेलता है (1) मजेदार तस्वीरें (1) मरे हुए बच्‍चों को फिर जिंदा करने का दावा! (1) महाभारत काल में परमाणु बम (1) महाभारत काल्पनिक नहीं (1) महिलाएं भी करतीं है यह गंदा काम... (1) माथा देखकर जानिए आप बनेंगे अधिकारी या भाग्य करेगा कंजूसी (1) मुर्गी पहले आई या अंडा (1) यह फोटोशॉप का कमाल नहीं है (1) यह है दो मुंह वाला व्यक्ति (1) यहां जुड़वां बच्चों का जन्म होना आम बात है (1) यहां हमले हुए तो खत्म हो जाएगा इंटरनेट (1) यूपी पुलिस ने महिला को निर्वस्त्र कर (1) ये बात लड़के भी नहीं जानते! (1) रखें इन 10 बातों का ध्यान (1) रहस्यमयी है यह मंदिर अंग्रेज भी नहीं खोज पाए इसके पीछे का राज (1) लग जाती है आग (1) लड़की पटाने के टिप्स या तरीके (1) लड़की पटाने के तरीके (1) लड़कों की ये 11 अदाएं लड़कियों के दिल को छू जाती हैं (1) लड़कियाँ क्या करती है जब वो किसी को पसंद करती है ! (1) वैज्ञानिकों के उड़े होश (1) वो 5 खजाने....जो बन गए रहस्य (1) शर्मीली लड़की को कैसे करें आ​कर्षित? (1) शादी से पहले पार्टनर से पूछे ये 5 सवाल... (1) शाहरुख के बंगले ( 'मन्नत' ) की INSIDE PHOTOS (1) शिष्यों की पत्नियां भी हड़प लेता था नारायण सांई (1) संकट के संकेत (1) संगीत सेरेमनी में बेटी ने किया था डांस (1) संपत्ति ही नहीं (1) सचिन तेंदुलकर (1) सड़कों पर दौड़ाई बिना ड्राइवर वाली बसें! (1) सरकार आपके अकाउंट पर रखेगी नज़र तो फेसबुक करेगा आगाह (1) सरकार देती है इसकी इजाजत (1) साउथ अफ्रीका की गुफा में मिला इंसान का नया 'रिश्तेदार' (1) सावधान! आसमान से आ रही है बड़ी आफत (1) सुलझ गई है पहेली (1) सैकड़ों सालों से इस नदी से निकल रहा है सोना (1) हर लड़की आपके पीछे आएगी (1) हिंदी में शायरी (1) हैरतअंगेज सीन्स (1)