Professional Documents
Culture Documents
o o
.4
ar he
g
+,. €et&rl*,vr t, ol*.h.tlbif/. liafu ,. Xh ri.r$+,r @,
i,{f*q,-ct.&l&iLd^6.&4Je,4rb1CI,,r.t?&y'.- 6)-f -M a
DL+*r *,^hf a n M- DB t,#-1*i6:."1-X
r a a ! !\,
+ kfi- ' @
gUtg'r?ut Jts .rt& - itl-^L
+ ?g l, -T
a,. loqtc.altu'lcuNfMA$ cr*U*to+t qr4l#Se,!S"\,te4r#
U
@s t,
'I? $#ft,:e$.i F*.uf,fu.*dh** wtftud.*tak+o*,WW
'gAjt: r-._--T- IliJ-poJl-
+ {t &.a^6 eq4s{rpq-Lrornd, +-€€+nr- qfp
&g
' 1n#t f ,W/HJ.&
J
q"1qf, .d
DBME
Lr' ffid$-S{L1d9&puilfrrL* zi !"dDr\oe ar}l |errde!fi dADi& .iffi,,g,fito,;a
r
e$*6h s^ e +nairrffi.fin .Jtr" Dg
vr' *bffi
r Darjlriura sptrjLr.u aon*uou,B.g.rt,,,*tt'-&CoJ*tai}'e eh.*d*ifb 4b{t
-
it- '
c&^{$rl4s&a ; pytu*a eLarfti, ,q" a.a}{., i*t'ild,r.L.te4sCIt&r&to.l uB.lLs r Y
&
t
U t I
b 4 ^**,
s &*e*J=hsr.l 4se
L\*:f +r
o
$L-;
li
g
.$, \"*
""\S.-'+.' -
*r> -, D40u_
S&g\{.e d,al<-o-n
fr I
1"t &-
a
i./
f.
5: rli
.i!.,,' -":i ,*.**.$ '
a
.} \+d1-
DB Ins
I M ur.rJ\,i
,l;*.s**r**'o.**
* -fi*, s{\uAa *
,+"i ,r.,.d*f.:, d+ .rl
h$
E & I*nt,n.
a
&d$6sa ,i
* .I
9.s,' t
t&)
)
ti6nnr3&(b;rrt*^'
\ .$nnarr^3_If e\a { .+
ld4&JelrJa4 g
,,J,
s ,*
f
.f.
.F!
-*."p
*: .; +l .gir.i ,
OB n4.s
o 1>,
s
tta
'* 'i, A
b'.
-a
i ',"r
,i'ii
d, t o
Er
W T
,.O
DBf\S ,ll-glra,(J v
t{ \ F
,
D
a o
ds"ba ,LYl
drkrfi Cq.a-L
.r':,\,
q
* .!
1
...
rt
\
dde ) il^f,i\*a}"tll,
* ,s
h. o
ut-
7es {b all.*-rr-fra
.ac
rj : li -1 i t
i r: a : , ,.
""' ff t&* rn
t'"^;H#'+r
r D f)
\,.,, a {c
ri} 2
el.a^deqa
ero l,'r'
*,
,$,b ,i '.i- extrs U)
e rl
i t _ng*,;t
+* I
.d,
&^+d
\
!
l
.lvc,drh
r,dtJ-.&o I
.3: ,**-i.
lrdr{,lJ* i
ry *rt$!A&.* tc*ar-+-l.L M
,
l4"b' hno4r.fa -
1444, a4k <
a-d,#'baa1 r,rl;yiaJyL b -
G d
D tg,-it Fqr
A^b *&ih
E rr.b' M , A{rffib\
c
€A 4"."€L lryltt& t
B * 0r&
\ #aJ" ffi 'r* STUD
s q,&€\K I 7*'r-
& -W*;6-W&*JI o* * Mr*t-/,,j;y^t i
h4,.Lf) -
S A&,tua " tv\tfuL
3T U
!I
*$r-osenF - &-+f
j*
i,
J --"
:.\ "l -. ri.
.** t,. I l* lS
::!L
;1.,i I *\ -+\ri
..x - :- *: =
.dB' fu ns
c
@D8 -t
Lt$r*d A
-+ ,ffi:,,'dl.tli,fp'
i
I
.fuwl&l
I i-".*
'r+
aa
&&, .a
."i .;t ."., ii,;
rv=
&
e*f
Mk
.& ,',..,&, ,*,*'.4*'**'i:**t
o uB L-.-.rr, .1 -:.;
S.*'*,".*-**}.5t DB
.1.\
,.{:
'.
f-l r4 i,F.,
: . ..'i*J qCt
..Y.; ; t :
i'+
t,l- ..i::$'.,F
;.: '. i
i''-t' ,? . ."iq.-\
,t qi
rh i- .1!i
-q*i*r-ii.*:;;
L
DNE:
ROII No.:
't
..n
,t
_
r\ I
r i.j:,_"..-
-fi^f
**
er"L $* "Fg #
,W 1 , .r"ro
,#=-_ ..*,
I.
1\
-,*
PD 1-
bo'A D DL
(€$^f i
t tr^
I
e
d-
tu f, ,k-Fs*
*#
a'
t. t. ':_t!
,, a \
,TS
s.
J"*'Li 's t;i
c D
,E t'
tfb,t{ *:.
d*
I o*t
0
+{..,,'"t"*** l-}
c esw\rfft&r,'r
t\
-r\
' -.t1" .l- *
F'
Y. -
n
"
* t{t"
4l- r* -1t
\
::1
"l.
'-1
$\
\ 19,*,''*;t
i .li
"*,
t,+
Fi
'oo'S.L-
-'r#
\ s
drr i.\*s. i
G
.J
G . ,&-x -u
Sc-qIA
o
o c CtlAgt\^fr
&*a
r tt l-a 11
r + *.E' 1,4 . , -s 1+.
T@tmrr Lt LL
o .L:.I
r!
r- ,-"!.
,l
C
r.,$Art .L'tst ft{fi'd'{a 6?1*,..i8 t,-.
(;. \.:
,,jl ,'-i ?,
"
LL. ,*-- '--
L, -l'*;-
L t: ,.4, d&{ft{4ftCorr*.y.it
rg f+-vg F0 truT s ,
or*ry*$.S
6 5L T f:&ftrds.A-c-r
fi t*t*
L B
b
1
u' ' :'' a,ff'-',
D *rt L} *...t:i +.\,,*-
:t.
il.i
+e bt
tuzy-J, ?-$..x.g."tt **,;-"+
-x$-, 6"v5
fr +-5 {*@*ly,o& !..(
t
!.
t i:t ,.'
C:F+
",,
r*r uiji
-'i,,--
t?-r*, j1,_41.'i \-rj
i.i.:lil";,::i
j
:i:j
i].1: tl-.1:-:r, i ::i-: i.jrt:.s
L.r. "\']'-;; ij .
;it ir'.:.ii:: ;.:.
li.;i,r,,
Al;r.;..;,r.:-ii
i..::
ir r''.-
;l',"
i-i;;i..r'..
'i]rrl::l):,:"
i..
L ;-i i' I i.i
t.:,---:
i_;.ii
i
i,;i.l
;.-.--,.-*.., _.-_.__--,,.
? t
- Stored on disk & manaqed b5. the OS (..i ., , ',
'. :1i... 1
i".lr,,:',;; ,,.]t.,
'.,-il-:: rr, .-, :
i;::;i::.,:r:.: i:
- DBMS may have its own buffer management {
.: : I ::,r-l : :,':,,..
?
- Manages storage & retrievar of data and rnetad ata. S1r:r,.:ij
!.'....
3. Dts Users : {.,:., t .,i,, ,,; t
[i;ri.r
ir,l.; ; ,il:.,1 r: r
r
,i.
''' i ! -. i.. :
i)::'.::
DBA statF Define and tune the database :i:ii ::.li-l i.l ..,
*\,
'.:-,,,,
t-l i,:.- .
Other Tools
I. Data dictionary I repository
o used to store schema descriptions and other information
such as design decisions, application program
descriptions, user information, usage standards, etc.
o Active data dictionary is accessed by DBMS software
and users/I)BA.
o Passive data dictionary is accessed by users/DBA only.
2' Application Development Environments & cASE (computer-aided
software engineering) tools environment
for database design, GUI development, querying, updating, -
and application program development
Examples: powerBuilder (Sybase), JBuilder
6o.uoa1, r6"""top.i rOc (oracil)
s
\
MB&{S ARCSSTTHCTilRES f:,_.l1t
L]Ui.
r_" t l!
i) I 1 1;;g y_ ;,1 i i;r r:
Network Client 1#i,ll ii:ii,ri,ir.l,
I
Drspia:y D;;i;liir,; i ;,'- r. i rr .,
Terminals
i\,4r: r: rtr,r l''1r-: i';;i.lr' i.rtrr:nit*r f- ,;.-
I
Netwcrk S*rver
?
Server rl\;;i-,li'..rl,i: ,
i
,,i
Software
__ I_
L/'1 ...ir/:.''' :,y.:i,il'..
Database
*6:erating Sy*tem 5r,t.,,: i'.i;il:ii,-ri-r: r,r : :r i 5i,.,.. i.,::,.
Server
'\rsi,,'',- 5,,::r I .bi'slcr:', : :, ,:.
u(.r!
._l-**
t*rrw.*i
if* #evi**s UJt rrbF{r-#{l
i r.1t,-t.
tFrint*rs,
Hardware/Firmwar* Tep**r[ves".".]
'*
I
1" Centratrized DBMS Architecturc
- IViainframe computers handled all system functions user application programs, user interface programs, DBMS
- Users accessed the DBMS through terminals with display capabilities but no processing power.
- All processing rvas done remotely on the central computer, with display information sent to terminals over
communication networks. !)iS.ri* '" " {t tuti..ti {ir:r..1 ,rit-i .1 r;t.l ,4.{o..r*r-r j adUtj{;,.,-r r,', !,};r,:& * d.
2. Basic ClientlServer Architectures
- Developed to handle environments with various interconnected devices like PCs, servers, printers,... via networks
- Specialized servers provide specific functionalities accessed by many client machines.
- Client machines provide interfaces to utilize these servers and local processing power.
3. Two-Tier ClienUServer Architectures for DBMSs
- Software components distributed over client and server systems.
- user interface programs and application programs run on the client side.
- DBMS access is established through client programs connecting to the DBMS.
- Open Database Connectivigr (ODBC) standard enables client-side programs to call the DBMS.
- Client programs can connect to multiple RDBMSs using ODBC ApI.
4. Tl:ree-Tier Architecture and n-Tier for web applications
- Introduces an intermediate layer between client and database server.
- Application servet or Web server acts as intermediary. Clients contain user interfaces and web browsers.
- Three tiers include the user interface, application rules, and data access layers.
- n-tier architectures offer flexibility and scalability, with tiers running on appropriate platforms independently
native
2, Number of tJsers: Single-user, multiuser
3. Distribution: Centralized, distributed {DDBh/rS) i-.(
t i: i.] !; 1 A
I i.. i.:::
aj lj I
i"lii l. ;',, I' ii i)
i.,"1-S
4. Cost: Open sourcs, personal, site licenses, modular s]-stems, :ii'; 'if:'Si:i
T
enterprise solutions i: :., i.,- i.r.; :'. r:'1i, -,,.;1; r,,1''11.',".i iJ.ti ;i ilr:l:, .'-.i'::: r:i i ri
5. Access Path Options: Inverted file structures, B-tree i- :,i,; i_. I : i,.) .'.,. i. ;"r i',, ;'r I i li i'.:. L"-'.i ;l.i;;, 5::1 i i*i r.1i StCl l.;
1. Requirements Collection and Analysis: gathering and analysirrg .i-.ii.l (_-r.ri :i i(:i ix
i-:iliiiS I :i-tr :4.r.,::i.l. .,i
1 Jl i':
1if; liS r:i.;ir,: i jri.i l :- l"jiiF!]i i';i.i i,.i :.) i,\
requirements from prospective clatabase us€rs. It involves interviewing ai,..: I
?
users to understand & find their data nceds and flnnctional requirements ..i :,'-:._ i i'i\ i l.'i :.! ;) il,, t ( I t_i.,:, ',.'
L..iil r..t ii-li.',rrr.:.,1;1.,l,
:'rq.:i.i1':
i 5it:i'
.:i-)t'. ;:,
it:-i
?
3. Conceptual Design: for the database using a high-level conceptual k:ter*# Seh*r,ta iX/1 ,i).r\i. rr-;l';
I
I
Entity - An distinct object, concept, or thing in the real world with physical
Attribute -property that describes an entity and provides more information about it.
Types of attributes:
Simple - indivisible and cannot be funher broken down into smaller components. Ex: Age
Cornposite - composed of multiple sub-attributes, each representing a distinct property of the entity. They can be
broken down into smaller parts, each with independent meanings. Ex: Address
Single-valued - hold a single value for each instance of an entity (at any point in time). Ex: date of birth
Multivalued - hold multiple values for each instance of an entity. They represent properties that can have more than
one value associated with them simultaneously. Ex: Skills of a person
Stored - whose values are directly stored in the database. They are typically retrieved directly from the database when
needed. Ex: Age
Derived - derived from other attributes within the database. Not stored directly but is calculated. Er Age from DOB
Complex - composed of nested composite and/or multivalued attributes. Grouping components of composite
athibutes within parentheses ( ) and separating them with commas & multivalued attributes are within braces { }
Ex: {Student_info( {Name(First_name, Last_name)}, Marks(Math, Science, English)} )}
NULL values - A special value called NULL is used for situations where attribute is not applicable or unknown.
NLILL is used w&en:
1. A particular entity may not have an applicable value for an attribute. Ex: Student without a Middle name
2. Unknown value of an attribute for a particular entify. 2 cases:
i" attribute value exists but is missilrg - Ex: height missing *!4/'t-
ii. attribute value doesn't exist - Ex: home phone not tliere
a of entities that share the same attributes. It is described by its name &
attributes
Entity Sets/Collection -The collection of all entities of a particular entity type in the database at arry point in time
Key attributes - one or more attributes whose values are distinct for each individual entiff in the entig set
It can be composite key attribute- 2 or more athibutes together. It must be minimal, non-superfluous
Value Sets @omains) - specifies the set of values that may be assigned to that attribute for each individual enttty.
A relationship type R among n entity types E1,F;2, . .. , En defines a set of associations--or arelationship set-
among entities from these entity types.
The relationship set R is a set of relationship instances ri, where each ri associates n individual entities (el, e2, . . . ,
en), and each entity ej in ri is a member of entity set Ej, 1 < j < n.
Degree of a Relationship Type - number of participating entity types. Degree 2-btnary, Degree 3 * ternary
Relationships as Attributes - A conceptualization where a binary relationship type is viewed as an attribute of one
of the participating entity types.
Role Names *Names assigned to the participating entity types in a relationship to signif, the role they play.
Recursive Relationships - Relationships where the same entity type participates in multiple roles within the same
relationship type.
Cardinality Ratios for Binary Relationships -specifies the maximum number of relationship instances that an
entity can participate in. 1:1, 1:N, N:1,M:N
Total participation - If every instance of entity Epe E participate in at least one relationship instance r, the
participation is said to be total. Also calied existence dependency.
Partial participation - lf only some of the instances of the enti$z type E participate in the relationship, the
participation is said to he partial.
f^41 TlP* trrnP i^rtu.1 fu,ragfe!^rt^{l Otagu*
n l(,*r"'"na
rMr { bt
)- lcr *i
Lr )LO 1 A^Af)
'82 \{
fuwde{-#,#fud
(e,ae, Soul"c-)
\
Weak Entify Types
Tffil
o Entity types that do not have key attributes of their own are called weak entity types.
o Entities belonging to a weak entity type are identified by being related to specific entities from another
entity type in combination with one nf their attribute values"
o This other entity type is called the identi$ing or owner entity t1rye, and rhe relationship type that
relates a weak entity type to its owner is called the identifuing relationship of the
weak entity type.
o A weak entity type always has a total participation constrainr with respect to its identifying
relationship because a weak entity cannot be identified without an ou/ner entity.
o A weak entity type normally has a partial key, which is the attribute that can uniquely identify weak
entities that are related to the same owner entity.
o The partial key attribute is underlined with a dashecl or dotted line.
ffiffi *r!*-rfii,"1fi
m ,i
ffi IHT
't
rI
ti
,
ffi
r
ffi
ru /a
i . r - t .31 : a
.-E
,+* -tt+* "*
a
r 'r"
i1r
!t*r
**)