Professional Documents
Culture Documents
Example
E-R Diagram of Hospital Management System
Name
Address
Address
Department
Age
Name
P_id
D_id
1
Doctor
M
Treats
Ph.No
Patient
1
Gender
Ph.No
Gender
M
Issued
1
Assign
BILL NO.
Room_id
Doc_Charges
Bill
Room Charges
Type
Room
R.NO
Enhanced ERDs include the same concepts that ordinary ER diagrams encompass. In
addition, EERDs include:
Supertype - an entity type that has a relationship with one or more subtypes.
Subtype - a subgroup of entities with unique attributes.
Every patient is cared for by a RESPONSIBLE_PHYSICIAN who develops a
treatment plan for the patient
Example: Patients
Each subtype also has unique attributes. Outpatients have a Checkback_Date, whilst
residents have a Date_Discharged and a unique relationship that assigns each patient to
a bed (this is a mandatory relationship, and each bed may or may not be assigned to a
patient)
CONSTRAINTS
Disjoint Rule: An instance of the supertype can be only ONE of the subtypes
Overlap Rule: An instance of the supertype can simultaneously be a member of more
Person_
Employee?
Address
Name
SSN
Sex
Date_of_
Birth
PERSON
Person_Type:
Salary
Employee
_Type
Employee?=Y
Student?=Y
Alumnus?=Y
EMPLOYEE
ALUMNUS
STUDENT
Date_Hired
Degrees
Student
Data RecoveryEmployee_Type=
& ProtectionYear
Date
Degree
d
Faculty
d
Staff
Grad
Unde
FACULTY
STAFF
GRADUATE
STUDENT
What is databaseRank
security?Position
Encryption
Test_Score
Threats
Treat Any situation or event, whether intentional or accidental, that may
adversely affect a system and consequently the organization.
i.
ii.
iii.
iv.
v.
UNDER
STUD
C
Sta
vi.
the statistical analysis may be allowed access to the statistical data which is
an aggregated data, but he should not be allowed access to individual data
Another concept is the creation of views. While the database record may
have large number of fields, a particular user may be authorized to have
information only about certain fields. In such cases, whenever he requests for
the data item, a view is created for him of the data item, which includes only
those fields which he is authorized to have access to. He may not even know
that there are many other fields in the records.
Backup and Recovery
Backup - The process of periodically taking a copy of the database and log file
on to offline storage media. Algorithm and
Journaling - The process of keeping and maintaining a log file (or journal) of all
changes made to the database to enable recovery to be undertaken effectively in
the event of a failure.
Encryption
Encryption - The encoding of the data by a special algorithm that renders the
data unreadable by any program without the decryption key.
Algorithm and
Plain-data
Plain-data
Encrypted data
Symmetric encryption - DES, IDEA, RC4, BlowFish, AES. Asymmetric
encryption - RSA, Diffie-Helman.
Proxy servers
Proxy servers is a computer that sits between a Web browser and a Web servers.
It intercepts all requests for web pages and saves them locally for some time.
Proxy server provides improvement in performance and filters requests.
Digital Certificates
Recovery
System Logging the log keeps track of all transaction operations affecting the
values of database items. The log is kept on disk so that it is not affected by
failures except for disk and catastrophic failures
Recovery from Transaction Failures
Catastrophic failure
Restore a previous copy of the database from archival backup
Apply transaction log to copy to reconstruct more current state by redoing
committed transaction operations up to failure point
Incremental dump + log each transaction
Non-catastrophic failure
Reverse the changes that caused the inconsistency by undoing the operations
and possibly redoing legitimate changes which were lost
The entries kept in the system log are consulted during recovery.
No need to use the complete archival copy of the database