Home Database SQL What are non-relational databases?

What are non-relational databases?

Jul 01, 2020 pm 03:24 PM
non-relational database

Non-relational databases include: 1. MongoDB, which is a document-oriented open source NoSQL database; 2. Cassandra, which was developed by Facebook for inbox search; 3. Redis, which is the most famous key-value store .

What are non-relational databases?

What is a NoSQL database?

NoSQL database (non-relational database) is a non-relational database system used to store and retrieve data. In today's world we should not just store all data in tabular format without predefined fixed schema (fixed without columns). Like user-generated data, geolocation data, and IoT-generated data, social graphs are an example of the exponential growth of real-world data. These huge amounts of data also require a lot of processing. This is when NoSQL databases appeared. Using NoSQL databases, we can store and retire file, key-value, graph-based data easily and faster. We can easily avoid complex SQL join operations. Easily scale horizontally with NoSQL DBs for real problems (web and enterprise business applications). Carlo Strozzi introduced the term NoSQL in 1998. Motivations for using NoSQL – Simplicity of design, horizontal scaling to clusters of machines

NoSQL Database Types

Document Databases – These databases typically associate each key with complex data called a document Structural pairing. Documents can contain key array pairs, key-value pairs, or even nested documents. Examples: MongoDB, Apache CouchDB, ArangoDB, Couchbase, Cosmos DB, IBM Domino, MarkLogic, OrientDB.

Key-value storage - Each individual item is stored as a key-value pair. Key-value stores are the simplest of all NoSQL databases. Examples: Redis, Memcached, Apache Ignite, Riak.

Wide Column Stores - These types of databases are optimized for queries on large data sets and store columns of data together instead of rows. Examples: Cassandra, Hbase, Scylla.

Graph storage - These store information about graphs, networks, such as social relationships, road maps, transportation links. Examples: Neo4j, AllegroGraph.

2019Best NoSQL Database

MongoDB: is a document-oriented open source NoSQL database. MongoDB uses JSON-like documents to store any data. It is written in c.

Cassandra: Developed by Facebook for inbox search. Cassandra is a distributed data storage system for processing large amounts of structured data.

Redis: is the most famous key-value store. Redis is written in C language. It is licensed under BSD.

HBase: It is a distributed non-relational database designed by Google for the BigTable database.

Neo4j: Called a native graph database because it effectively implements the property graph model, all the way to the storage layer.

Oracle NoSQL: Implemented mapping from user-defined keys to opaque data items.

Amazon DynamoDB: Uses a NoSQL database model that is non-relational, allowing documents, graphs, and columns among its data model.

Couchbase: is a NoSQL document database for interactive web applications. It has a flexible data model, is easily extensible, and provides consistent high performance.

Memcached: is an open source, high-performance, distributed memory caching system designed to accelerate dynamic web applications by reducing database load.

CouchDB: It is an open source NoSQL database that uses JSON to store information and JavaScript as the query language.

Recommended tutorial: "sql tutorial"

The above is the detailed content of What are non-relational databases?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How do I comply with data privacy regulations (GDPR, CCPA) using SQL? How do I comply with data privacy regulations (GDPR, CCPA) using SQL? Mar 18, 2025 am 11:22 AM

Article discusses using SQL for GDPR and CCPA compliance, focusing on data anonymization, access requests, and automatic deletion of outdated data.(159 characters)

How do I implement data partitioning in SQL for performance and scalability? How do I implement data partitioning in SQL for performance and scalability? Mar 18, 2025 am 11:14 AM

Article discusses implementing data partitioning in SQL for better performance and scalability, detailing methods, best practices, and monitoring tools.

How do I secure my SQL database against common vulnerabilities like SQL injection? How do I secure my SQL database against common vulnerabilities like SQL injection? Mar 18, 2025 am 11:18 AM

The article discusses securing SQL databases against vulnerabilities like SQL injection, emphasizing prepared statements, input validation, and regular updates.

How to use sql datetime How to use sql datetime Apr 09, 2025 pm 06:09 PM

The DATETIME data type is used to store high-precision date and time information, ranging from 0001-01-01 00:00:00 to 9999-12-31 23:59:59.99999999, and the syntax is DATETIME(precision), where precision specifies the accuracy after the decimal point (0-7), and the default is 3. It supports sorting, calculation, and time zone conversion functions, but needs to be aware of potential issues when converting precision, range and time zones.

How to create tables with sql server using sql statement How to create tables with sql server using sql statement Apr 09, 2025 pm 03:48 PM

How to create tables using SQL statements in SQL Server: Open SQL Server Management Studio and connect to the database server. Select the database to create the table. Enter the CREATE TABLE statement to specify the table name, column name, data type, and constraints. Click the Execute button to create the table.

How to use sql if statement How to use sql if statement Apr 09, 2025 pm 06:12 PM

SQL IF statements are used to conditionally execute SQL statements, with the syntax as: IF (condition) THEN {statement} ELSE {statement} END IF;. The condition can be any valid SQL expression, and if the condition is true, execute the THEN clause; if the condition is false, execute the ELSE clause. IF statements can be nested, allowing for more complex conditional checks.

How do I use SQL for data warehousing and business intelligence? How do I use SQL for data warehousing and business intelligence? Mar 18, 2025 am 11:16 AM

The article discusses using SQL for data warehousing and business intelligence, focusing on ETL processes, data modeling, and query optimization. It also covers BI report creation and tool integration.

How to avoid sql injection How to avoid sql injection Apr 09, 2025 pm 05:00 PM

To avoid SQL injection attacks, you can take the following steps: Use parameterized queries to prevent malicious code injection. Escape special characters to avoid them breaking SQL query syntax. Verify user input against the whitelist for security. Implement input verification to check the format of user input. Use the security framework to simplify the implementation of protection measures. Keep software and databases updated to patch security vulnerabilities. Restrict database access to protect sensitive data. Encrypt sensitive data to prevent unauthorized access. Regularly scan and monitor to detect security vulnerabilities and abnormal activity.

See all articles