0% found this document useful (0 votes)
157 views76 pages

Slides Rdbms 1

The document discusses the disadvantages of the traditional file-based approach to data management and the advantages of using a relational database management system (RDBMS). Some key disadvantages of the traditional approach include: data redundancy, data isolation, lack of security, and concurrent access anomalies. An RDBMS addresses these issues by providing data abstraction, data independence, centralized data administration and security controls. It allows for flexible ad-hoc querying and supports simultaneous, consistent access by multiple users.

Uploaded by

Pavan Kumar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
157 views76 pages

Slides Rdbms 1

The document discusses the disadvantages of the traditional file-based approach to data management and the advantages of using a relational database management system (RDBMS). Some key disadvantages of the traditional approach include: data redundancy, data isolation, lack of security, and concurrent access anomalies. An RDBMS addresses these issues by providing data abstraction, data independence, centralized data administration and security controls. It allows for flexible ad-hoc querying and supports simultaneous, consistent access by multiple users.

Uploaded by

Pavan Kumar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

Welcome to the course on Relational Database Management System.

In the traditional approach, information is stored in flat files which are maintained by the file system of OS. Application programs go through the file system to access these flat files.

10

Disadvantages of the traditional approach Data Security: The data as maintained in the flat file(s) is easily accessible and therefore not secure. Example: Consider the Banking System. The Customer_Transaction file has details about the total available balance of all customers. A Customer wants information about his account balance. In a file system it is difficult to give the Customer access to only his data. Thus enforcing security constraintsfor the entire file or for certain data items are difficult. Data Redundancy: Often the same information is duplicated in two or more files. The duplication of data also called redundancy leads to higher storage cost and access cost. It also lead to data inconsistency For Example, assume the same data is repeated in two or more files. If change is made to data in one file, it is required that the change be made to the data in the other file as well. If this is not done, it will lead to error during access of the data. Example: Assume Customers details such as Cust_Last_Name, Cust_Mid_Name, Cust_First_Name, Cust_Email is stored both in the Customer_Details file and the Customer_Fixed_Deposit file. If the Email ID of one Customer, for example, Langer S. Justin changes from [email protected] to [email protected], the Cust_Email has to be updated in both the files; otherwise it will lead to inconsistent data. However, one can design file systems with minimal redundancy. Data redundancy is sometimes preferred. Example: Assume the Customers details such as Cust_Last_Name, Cust_Mid_Name, Cust_First_Name and Cust_Email are not stored in the Customer_Fixed_Deposit file. If it is required to get this information about the customer along with his fixed deposit details, it would mean that the details be retrieved from two files. This would mean an increased overhead. It is thus preferred to store the information in the Customer_Fixed Deposit file itself. Data Isolation: Data Isolation means that all the related data is not available in one file. Generally, the data is scattered in various files, and the files may be in different formats, therefore writing new application programs to retrieve the appropriate data is difficult. Program/Data Dependence: Under the traditional file approach, application programs are dependent on the master and transaction file(s) and vice-versa. Changes in the physical format of the master file(s), such as addition of a data field requires that the change must be made in all the application programs that access the master file. Consequently, for each of the application programs that a programmer writes or maintains, the programmer must be concerned with data management. There is no centralized[3] execution of the data management functions. Data management is scattered among all the application programs.

11

Disadvantages of the traditional approach: Example: Consider the banking system. A master file, Customer_Fixed_Deposit file exists which has details about the customers fixed deposit accounts. A customers fixed deposit record is described as follows:
Cust_ID Cust_Last_Name Cust_Mid_Name Cust_First_Name Cust_Email Fixed_Deposit_No Amount_in_Dollars Rate_of_Interest_in_Percent

An application program is available to display all the details about the fixed deposit accounts of all the customers. Assume a new data field, the Fixed_Deposit_Maturity_Date is added to the master file. Because the application program depends on the master file, it also needs to be altered. If the physical format of the master/transaction file for example the field delimiter, record delimiter, etc. are changed, it necessitates that the application program which depends on it, also be altered. Lack of Flexibility: The traditional systems are able to retrieve information for predetermined requests for data. If the management needs unanticipated data, the information can perhaps be provided if it is in the files of the system. Extensive programming is however required which may result in delay in making the information available. Thus by the time the information is made available, it may no longer be required or useful. Example: Consider the banking system. An application program is available to generate a list of customer names in a particular area of the city. The bank manager requires a list of customer names having an account balance greater than $10,000.00 and residing in a particular area of the city. An application program for this purpose does not exist. The bank manager has two choices: To print the list of customer names in a particular area of the city and then manually find out those with an account balance greater than $10,000.00 Hire an application programmer to write the application program for the same. Both the solutions are cumbersome. Concurrent Access Anomalies: Many traditional systems allow multiple users to access and update the same piece of data simultaneously. But the interaction of concurrent updates may result in inconsistent data. Example: Consider the bank system. Assume the bank manager is analyzing all the transactions made by the customers. At the same time, a customer accesses his account to make a withdrawal. The account is both read by the bank manager and updated by the customer at the same time. This is called concurrent access. Because the customers account is being updated at the same time, there is a possibility of the bank manager reading an incorrect balance. These difficulties prompted the development of database systems.

12

Services provided by a DBMS Data management Data definition Transaction support Concurrency control Recovery Security and integrity Utilities- facilities like data import & export, user management, backup, performance analysis, logging & audit, physical storage control

13

Now, the DBMS acts as a layer of abstraction on top of the File system. You might have observed that, for interacting with the file system, we were using high level language functions for example, the c file handling functions. For interacting with the DBMS we would be using a Query language called SQL.

14

15

16

In the above figure, the three level of DBMS architecture is depicted. The External view is how the Customer, Jack views it. The Conceptual view is how the DBA views it. The Internal view is how the data is actually stored.

17

18

DBA is a key person and takes care of most administrative tasks as mentioned in the slide. Database designers, design the database elements. Application programmers, make use of the various database elements and write programs to retrieve data from them. End users use the DBMS.

19

Users and application programs need not know exactly where or how the data is stored in order to access it. 2. Proper database design can reduce or eliminate data redundancy and confusion. 3.Support for unforeseen (ad hoc) information requests are better supported - better flexibility. 4. Data can be more effectively shared between users and/or application programs. Data can be stored for long term analysis (data warehousing).

20

21

Commercial Packages Hierarchical Model an example is IMS (Information Management System) Network Model an example is IDMS (Integrated Data Management System) Relational Model few examples are Oracle, DB2(DataBase 2)

22

Record based data model Hierarchical data model Organizes the data in a Tree Structure There is hierarchy of parents and child segments Data is represented by a collection of records types

This restricts child segment having more than one parent


E.g.: Information Management System (IMS) from IBM

23

Record based data model Network data model Data in the network model is represented by a collection of records Relationships among data are represented by links (Pointers) The records in the database are collection of graphs E.g.: Integrated Data Management System(IDMS) from Honeywell

24

25

Though logically data is viewed as existing in the form of two dimensional tables, actually, the data is stored under the file system only. The RDBMS provides an abstraction on top of the file system and gives an illusion that data resides in the form of tables. Tuples in a relation are always unique, Example: If Student is a relation, each tuple of the relation will represent one students information.

26

Candidate Key An attribute, or group of attributes, that is sufficient to distinguish every tuple in the relation from every other one.

A candidate key is all those set of attributes which can uniquely identify a row. However, any subset of these set of attributes would not identify a row uniquely
Primary key The candidate key that is chosen to perform the identification task is called the primary key. Every tuple must have, by definition, a unique value for its primary key. A primary key which is a combination of more than one attribute is called a composite primary key .

27

28

29

30

An attribute, or group of attributes, that is sufficient to distinguish every tuple in the relation from every other one.

A candidate key is all those set of attributes which can uniquely identify a row. However, any subset of these set of attributes would not identify a row uniquely

31

32

Overlapping candidate keys: Two candidate keys overlap if they involve any attribute in common. For e.g, in the above Customer table, Cust_Id, Account_No and Emailid, Account_No are two overlapping candidate keys. (they have Account_no in common)

33

Primary key The candidate key that is chosen to perform the identification task is called the primary key. Every tuple must have, by definition, a unique value for its primary key. A primary key which is a combination of more than one attribute is called a composite primary key .

34

Foreign key Usually a foreign key is a copy of a primary key that has been exported from one relation into another to represent the existence of a relationship between them. Foreign key values do not (usually) have to be unique. Foreign keys can also be null .

35

36

37

38

39

40

The spouse data is identified with the help of the employee id to which it is related

41

Key attribute mentioned in the slide should not be miss understood with key attribute discussion of relational model. The key attribute discussion here is only in the context of ER Diagram.

42

43

44

The minimum and maximum values of this connectivity is called the cardinality of the relationship

45

All employees will not be head-of some department. So only few instances of employee entity participate in the above relationship. But each department will be headed by some employee. So department entitys participation is total and employee entitys participation is partial in the above relationship.

46

48

49

Represented by an ellipse from which other ellipses emanate and represent the component attributes. E.g Address

51

A unary relationship is represented as a diamond which connects one entity to itself as a loop. The relationship above means, some instances of employee manage other instances of Employee.

52

53

A relationship between two entity types

54

A relationship connecting three entity types.

55

All instances of the entity type Employee dont participate in the relationship, Head-of.

Every employee doesnt head a department. So, employee entity type is said to partially participate in the relationship.
But, every department would be headed by some employee. So, all instances of the entity type Department participate in this relationship. So, we say that it is total participation from the department side.

56

These attributes best describe the relationship prescription rather than any individual entity Doctor, Patient or Medicine.

57

The identifying relationship is the one which relates the weak entity (dependant) with the strong entity (Employee) on which it depends. Id is underlined with a dotted line because it is used to form composite key of dependent entity along with E#.

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

You might also like