Professional Documents
Culture Documents
RDBMS - Muj
RDBMS - Muj
ER Diagram
Entity-Relationship Diagram
Entity-Relationship Model
3
• Attributes
• Attributes describes the properties of Entity.
• Represented by Ovel. Attribute
• For Example:
• Person is the Entity and the attributes are:
• Name | DoB | Address | Phone No. | Profession
• Value Set (Domain) of Attributes
• Set of values that may be assign to the attribute, E.g. :
• Name - String
• Age – number (b/w 18 to 65)
• Phone No. – digits ( 10 digits is constraint)
4
Types of Attributes . . .
• Simple attribute
• Simple attributes are atomic values, which cannot be divided further.
• For example, a student's phone number is an atomic value of 10 digits.
• Represented by Ovel Phone no.
• Composite attribute
• Composite attributes can be divided further.
• For example, a student's complete name may have first_name, middle_name
and last_name.
• Derived attribute
• Derived attributes are the attributes that is not stored.
• but their values are derived from other attributes present in the database.
• For example
• Age can be derived from data_of_birth.
• Average_salary in a department should not be saved directly in the database, instead it can be derived.
• Represented by Doted Ovel Phone no. 5
Types of Attributes . . .
• Single-Valued attribute
• Single-value attributes contain single value.
• For example - DoB, PAN Card No..
• Multi-Valued attribute
• Multi-value attributes may contain more than one values.
• For example, a person can have more than one phone no.
• Represented by Double Ovel
Phone
Attribute
No.
6
• Relationship
• Relationship is association among entities.
• For Example: Student study course
• Relationship represent by Diamond
10
Work
Employee Department
for
11
Weak Entity Sets
• An entity set that does not have a primary key is referred to as a
weak entity set.
• The existence of a weak entity set depends on the existence of a
strong entity set.
• it must relate to the strong entity set via a total, one-to-many relationship
set from the identifying to the weak entity set
• Identifying relationship depicted using a double diamond
• The discriminator (or partial key) of a weak entity set is the set of
attributes that distinguishes among all the entities of a weak entity
set. Represented by dashed line.
• The primary key of a weak entity set is formed by the
primary key of the strong entity set Partial key of weak entity
on which the weak entity set is + (discriminator)
dependent
Weak Entity Sets (Cont.)
• We depict a weak entity set by double rectangles.
• We underline the discriminator of a weak entity set with a
dashed line.
• payment-number – discriminator of the payment entity set
• Primary key for payment – (loan-number, payment-number)
ER-Diagram with Composite, Multivalued and
Derived value
15
Summary of Symbols Used in E-R Notation
Steps for E R Modelling or E R Diagram
23
Type of Architectures
24
1-Tier Architecture
• In this architecture, the database is directly available to the user. It means
the user can directly sit on the DBMS and use it.
• Any changes done here will directly be done on the database itself. It
doesn't provide a handy tool for end-users.
25
2-Tier Architecture
• 2-Tier architecture is the same as the basic client-server. In the
two-tier architecture, applications on the client end can directly
communicate with the database at the server-side. For this
interaction, API's like ODBC, JDBC are used.
• The user interfaces and application programs are run on the client-
side.
• The server side is responsible to provide the functionalities like query
processing and transaction management.
• To communicate with the DBMS, the client-side application
establishes a connection with the server-side.
26
3-Tier Architecture
• The 3-Tier architecture contains another layer between the client and
the server. In this architecture, the client can't directly communicate
with the server.
• The application on the client-end interacts with an application
server which further communicates with the database system.
• End-user has no idea about the existence of the database beyond the
application server.
• The database also has no idea about any other user beyond the
application.
• The 3-Tier architecture is used in case of the large web applications.
27
Three schema Architecture
• The three schema architecture is also called three-level
architecture.
28
3 - Schema/ Views of Data
• Physical Level: (Internal Level)
• Describe the way how data is organized in the storage device.
• It describe the physical storage structure of database.
no need of change.
35
Types of Data Independence
Data independence can be classified into the following two types:
1. Physical Data Independence
2. Logical Data Independence
37
FAQs
39
THANK YOU
For queries
Email: amit.garg@jaipur.manipal.edu
40