Professional Documents
Culture Documents
Adele Kuzmiakova - The Creation and Management of Database Systems-Arcler Press (2023)
Adele Kuzmiakova - The Creation and Management of Database Systems-Arcler Press (2023)
Database Systems
THE CREATION AND
MANAGEMENT OF DATABASE
SYSTEMS
Edited by:
Adele Kuzmiakova
ARCLER
P r e s s
www.arclerpress.com
The Creation and Management of Database Systems
Adele Kuzmiakova
Arcler Press
224 Shoreacres Road
Burlington, ON L7L 2H2
Canada
www.arclerpress.com
Email: orders@arclereducation.com
This book contains information obtained from highly regarded resources. Reprinted material
sources are indicated and copyright remains with the original owners. Copyright for images and
other graphics remains with the original owners as indicated. A Wide variety of references are
listed. Reasonable efforts have been made to publish reliable data. Authors or Editors or Publish-
ers are not responsible for the accuracy of the information in the published chapters or conse-
quences of their use. The publisher assumes no responsibility for any damage or grievance to the
persons or property arising out of the use of any materials, instructions, methods or thoughts in
the book. The authors or editors and the publisher have attempted to trace the copyright holders
of all material reproduced in this publication and apologize to copyright holders if permission has
not been obtained. If any copyright holder has not been acknowledged, please write to us so we
may rectify.
Notice: Registered trademark of products or corporate names are used only for explanation and
identification without intent of infringement.
Arcler Press publishes wide variety of books and eBooks. For more information about
Arcler Press and its products, visit our website at www.arclerpress.com
ABOUT THE EDITOR
List of Figures.........................................................................................................xi
List of Tables........................................................................................................xiii
List of Abbreviations.............................................................................................xv
Preface............................................................................................................ ....xix
viii
Chapter 8 Database Administration and Security................................................... 217
8.1. Introduction..................................................................................... 218
8.2. The Role of a Database in an Organization...................................... 220
8.3. Introduction of a Database............................................................... 222
8.4. The Evolution of Database Administration Function......................... 224
References.............................................................................................. 230
Index...................................................................................................... 235
ix
LIST OF FIGURES
xii
LIST OF TABLES
Table 1.1. The characteristics of many famous file organization systems are compared
Table 1.2. Terminology for basic files
Table 2.1. Major data models have changed over time
Table 4.1. Alternate names for terms in relational models
Table 5.1. A synopsis of the principal activities connected with each phase of the
DSDLC
Table 5.2. The requirements for an optimum data model
Table 6.1. Table of results for example #1
Table 6.2. Table of results for example #2
Table 6.3. With duplicates, the outcome table for example #3
Table 6.4. Duplicates are removed from the outcome table for example #3
Table 6.5. Table of results for example #4
Table 7.1. Example OLE-DB interfaces and classes
Table 7.2. Example ADO objects
Table 7.3. Features and advantages of internet technologies
LIST OF ABBREVIATIONS
xvi
UoD universe of discourse
W3C world wide web consortium
WSAPI WebSite API
XML extensible markup language
xvii
PREFACE
The database system has become one of the most significant advancements in software
engineering due to the extraordinarily productive history of database research over the
past 30 years. The database has now become the foundation of information systems (IS)
and drastically altered how organizations store and access information. This technology
has advanced significantly recently, resulting in more robust and user-friendly designs.
Database systems are becoming increasingly accessible to a broader audience due to
this. Unfortunately, users have created databases and apps without the skills essential to
create a reliable and successful system because of the systems’ seeming simplicity. And
thus, the “software crisis,” or “software slump,” as it is often frequently called, persists.
The authors’ experience in the industry, where they provided database design consulting
for new software systems and addressed shortcomings with existing systems, served
as the initial impetus for this book. Additionally, the authors’ transition to academia
resulted in the same issues being raised by other users—students. Therefore, the goals
of this book are to create a textbook that explains database theory as simply as possible.
The approach for relational Database Management Systems (DBMSs), the current
industry standard for business applications, is explained in this book and has been
tried and proven throughout time in both academic and industrial settings. Conceptual,
logical, and physical database design are the three key stages that make up this process.
The creation of a conceptual data model that is unrelated to any physical factors is the
first step in the first phase. By eliminating components that cannot be represented in
relational systems, this model is subsequently improved in the second step to becoming
a logical data model. The physical design for the target DBMS is converted from the
logical data model in the third step. The storage configurations and access techniques
needed for effective and safe access to the database on secondary storage are taken into
account during the physical design phase.
The book is divided up into a total of eight different chapters. The reader is given an
introduction to the principles of database systems in the first chapter. The data models
are discussed in considerable depth in Chapter 2. The Database environment is covered
in great detail in Chapter 3.
In Chapter 4, the relational model is presented to the readers of the book. The planning
and design of the database are given a lot of attention in Chapter 5. The concept of
data manipulation is broken down and shown in Chapter 6. Database connectivity
and web technologies are also discussed in Chapter 7. In the last chapter, “Chapter 8,
Administration and Security of Databases,” we discuss database administration and
security.
This book does an outstanding job of providing an overview of the many different
aspects of database systems. The content is presented in such a way that even an
untrained reader should have no trouble understanding the fundamental ideas behind
DBMSs if they read this text.
xx
CHAPTER 1
INTRODUCTION TO DATABASE
SYSTEMS
CONTENTS
1.1. Introduction......................................................................................... 2
1.2. Why Databases?.................................................................................. 2
1.3. Data Vs. Information............................................................................ 4
1.4. Introducing the Database..................................................................... 6
1.5. Importance of Database Design......................................................... 12
1.6. Evolution of File System Data Processing........................................... 13
1.7. Problems with File System Data Processing....................................... 18
1.8. Database Systems.............................................................................. 24
References................................................................................................ 34
2 The Creation and Management of Database Systems
1.1. INTRODUCTION
Databases and the systems that manage them are an indispensable part of
life within today’s contemporary civilization. The majority of us participate
in so many activities daily that need some level of connection with only a
database (Valduriez, 1993). For instance, if we’re in a financial institution
to deposit money or withdrawal, if we make reservations at a restaurant or
aviation, if we use computer-based library resources to seek a bibliometric
item, or even if we buy anything online like a book, plaything, or computer,
there is a good chance that our actions will engage somebody or computer
simulation accessing a dataset. This is the case regardless of whether we are
the ones trying to access it or not. Even just the act of buying things in a
supermarket may sometimes immediately access the data that maintains the
inventories of food products (Güting, 1994).
Such exchanges are instances of what we could refer to as classic
database systems. In such applications, the vast majority of data which is
stored as well as retrieved seems to be either text-based or numerical. In the
recent past, fascinating new uses of database management systems (DBMSs)
have been made possible as a result of developments in technology (Zaniolo
et al., 1997). The prevalence of online sites for social networks, including
Facebook, Twitter, as well as Flickr, amongst many others, has necessitated
the formation of massive databases that stockpile non-conventional data,
including such articles, Twitter posts, photos, and short videos, amongst
other things. These databases can be found on websites like Facebook,
Twitter, and photo sharing sites. To manage information for social media
sites, new kinds of database systems are developed. These new forms of
database systems are sometimes referred to as large data storage devices or
NoSQL platforms (Jukic et al., 2014).
Those certain types of technology are often used by firms such as Amazon
and Google to manage information needed in one’s search engine and also
provide cloud services. Cloud storage is a method by which customers are
supplied with systems that store on the web for the management of all types
of data which include files, photos, video files, and e-mails. Cloud storage
is supplied by companies like Google, Yahoo, and Amazon (Abadi et al.,
2013).
money to, and also who users owe to. All firms must store this sort of data,
as well as more, then they essentially make that information accessible to the
executive when they require it. It may be contended that the real goal of any
corporate data system is to assist organizations in using the information as a
resource. Data gathering, collection, compilation, modification, distribution,
and administration are at the core of all these technologies (Karp et al., 2000).
That data might range from just a few megabytes on only one or two
themes to tera-bytes spanning hundreds of subjects inside the firm’s micro and
macro environment, based on the kind of data system and the features of the
organization. Sprint and AT&T are both recognized for having organizations
that stock statistics on billions of telephone conversations (Tolar et al., 2019),
through fresh facts actuality uploaded to the network at rates of up and
around to 70,000 conversations. Such business must non-solitary store and
handle massive amounts of data, but they must also be able to swiftly locate
any given information within that information. Consider the situation of
Google, the Web’s most popular search engine. Although Google is reticent
to provide many specifics regarding its digital storage specs, the situation is
thought that the corporation replies to concluded 91 million inquiries each
diurnal over an information set that spans many terabytes. Surprisingly, the
outcomes of these queries are virtually instantaneous (Zhulin, 2015).
How are these companies going to handle all this information? How
will they be able to save everything and then rapidly retrieve just the
information that judgment needs, whenever they require it? The solution
would be that databases are being used. Databases were complex and
interconnected enabling computer-based programs to save, organize, and
retrieve information fast, as detailed in-depth inside this textbook (Grimm et
al., 2013). Practically completely present commercial organizations depend
on databases; therefore, each data management skill necessity consumes a
systematic grasp of what way these frameworks are produced and how to
utilize them properly. Although your professional path does not lead you
down the exciting route of file design and construction, databases would
be a serious constituent of the technology you deal with. In just about any
event, you’ll possibly type choices in your profession created on data-driven
knowledge. As a result, understanding the distinction between information
and data is critical (Thomson, 1996).
4 The Creation and Management of Database Systems
Source: https://www.researchgate.net/figure/The-transformation-process-from-
raw-data-into-knowledge-3-US-Joint-Publication-3–13_fig1_281102148.
The information description for each item here on the survey questionnaire,
for example, may highlight the workroom’s fortes and limitations, allowing
you to type more knowledgeable judgments about how to improve service
lab clients. Remember that original data should be correctly formatted
before being stored, processed, or presented. For instance, in Figure 1.1,
Panels C, the pupil classification is organized to present statistics based
on the Freshmen, Junior, Junior, Seniors, and Master’s Student categories
(McKelvey & Ordeshook, 1985). For data preservation, the yes/no replies
of the participants might necessity to be translated into a Y/N arrangement.
When dealing with sophisticated data types like audio, movies, or photos,
more extensive formatting is necessary treated, or accessible. In Figure 1.1,
Panel C, for example, the learner categorization is grouped to display data
for freshmen, Juniors, Seniors, and Master’s Students. The yes/no responses
of the respondents might have to be rehabilitated towards a Y/N platform
for information retention. The additional thorough format is obligatory once
employed through complicated statistics formats such as music, video, or
pictures (Cheng et al., 2002).
The ability to make appropriate decisions within that “information
era” requires the development of reliable, useful, and fast data. As a result,
competent judgment is critical to a firm’s success in a world market (Stowe et
al., 1997). The “knowledge era” is now thought to be upon us. 2 Facts are the
basis of knowledge, which would be the collection of facts and information
6 The Creation and Management of Database Systems
Figure 1.2. The database management system (DBMS) controls the interface
between the end-user then the database.
Source: https://slideplayer.com/slide/14646685/.
8 The Creation and Management of Database Systems
position(s), and projected kind besides the degree of usage. The amount of
operators in such a database affects whether it is solitary or multiuser. Just
one user may access a central database at such a time. To put it another way,
if customer A used the data, customers B and C should wait unless he or she
is through. A desktop database is a centralized repository that operates on
such a personal computer (Chen et al., 2021).
Multiple access databases, on the other hand, may accommodate several
users simultaneously. A workplace database is just a multiple-user database
that serves a limited amount of users (typically less than 50) or a single
department within an organization. The organization database is used by the
entire company and accommodates a high amount of users (usually hundreds)
from various departments (Johnson, 2021; Kodera et al., 2019). The folder
could potentially be classified based on its location. A central database, for
instance, handles data from a single location. A dispersed database is a type
that allows data that is dispersed over several places. Consolidated Database
Systems define the extent to which a database may be extended and how that
dispersion is managed (Gavazzi et al., 2003).
Unfortunately, the most common method of categorizing databases
nowadays is depending on how they’ll be utilized and the temporal quality
of the data obtained from them. Events like product and service purchases,
payments, and supplier purchases, for instance, indicate important day-to-
day activities. Such activities must be correctly and promptly documented.
An operating database is a type that is mainly used to assist a firm’s day-
to-day activities (occasionally mentioned as a transactional or making
database) (Urvoy et al., 2012; Beets et al., 2015). A database server, on the
other hand, is mainly concerned with data storage that is utilized to create
information needed to make strategic or tactical choices. To create price
judgments, sales predictions, positioning strategies, and other decisions,
substantial “data massaged” (data modification) is usually required (Joshi
& Darby, 2013). Most judgment data is derived from database systems and
kept in data stores over time. Furthermore, the database server may store
information generated from a variety of sources. The data storage structure
differs from that of an operating or operational database to make it simpler
to obtain such data. Storage systems, Business Analytics, and Data Stores
are all terms that refer to the design, deployment, and usage of data stores
(Cole et al., 2007).
Databases may also be divided into categories based on how organized
the data is. Data that occurs in the situation unique (rare) form, that is, inside
Introduction to Database Systems 11
Table 1.1. The Characteristics of Many Famous File Organization Systems are
Compared
can ultimately to a group’s collapse. It’s just too critical to leave database
design to chance. This is why database design is a popular subject among
college students, why businesses of all kinds send employees to database
development workshops, and also why data modeling consultants may earn
a lot of money (Tiirikka & Moilanen, 2015).
Source: https://slideplayer.com/slide/16127191/.
Introduction to Database Systems 15
You may recognize the file elements displayed in Figure 1.3 by using
the right file nomenclature listed in Table 1.2. There are ten entries in the
User file illustrated in Figure 1.3. C PHONE, C DESIGNATION, C ZIP,
C ADDRESS, A PHONE, AMT, TP, and REN are the 9 fields that make
up every record. The ten entries are saved in a file with a unique name.
The filename of the document in Figure 1.3 is Consumer since it includes
customer information again for an insurance agency (Pal & Memon, 2009).
Business customers issued demands to the DP expert for information
from the electronic file. For every demand, the DP expert had to write
programs to get data files, alter this as the consumer desired, and printed
them out. When a user requests a previously ran report, the DP expert may
restart the program and display the findings for them. Other corporate users
want to examine the data in the same inventive ways that consumer data
was being presented (Blomer et al., 2015; Zhang et al., 2016). This resulted
in increased demands for the DP expert to develop electronic files of those
other company data, which necessitated the creation of new data processing
and demands for reporting. The insurer company’s sales team, for instance,
developed a Sale file to monitor daily sales activities. The effectiveness of
the sales team remained so apparent that the employment section wanted
admission to a DP expert in automating payroll services as well as other
employment duties. As a result, the DP expert was requested to produce
the Agents file seen in Figure 1.4. The information in the Agents file was
utilized for a variety of functions, including writing checks, keeping track
of taxes collected, and summarizing health insurance (Adde et al., 2015).
16 The Creation and Management of Database Systems
Source: https://slideplayer.com/slide/6206909/.
The drawbacks of this sort of file structure became evident as more
digitized files were generated. Whereas these issues are discussed in further
depth in the following section, in summary, the issues revolved around
having a bunch of file systems containing relevant, frequently overlapped
data and no way to control or manage data uniformly across whole files.
Every file inside the network utilized one’s application software to store,
access, and modify data, as illustrated in Figure 1.5. Each file belonged to
the section or entity that had requested its development (Merceedi & Sabry,
2021).
Source: https://slideplayer.com/slide/8951940/.
Introduction to Database Systems 17
shared data routines are liable to change when some of the application’s data
storage properties change (that is, altering the type of data). Data integrity,
on the other hand, arises when changes in digital storing possessions may
be made deprived of affecting the agenda’s capacity to admissibility the
information (Veeraiah & Rao, 2020).
The contrast between both the conceptual file formats (how a person
sees data) as well as the actual file format is the actual relevance of data
reliance (in what way the processer must effort by the data). Any application
that reads a file from an operating system must somehow express to the
processor what to do, as well as how to do it. As a result, each application
must include lines that indicate the creation of a certain folder kind, as well
as records and feature descriptions. From the perspective of a developer
and database management, data dependency makes a data structure highly
inconvenient (Jin et al., 2012).
Figure 1.6. Comparing and contrasting database and file management organiza-
tions.
Source: https://slideplayer.com/slide/9384902/.
Keep in mind that such a DBMS is only one of the numerous essential
aspects of a DBMS. The DBMS is sometimes described to this as the database
program’s beating heart. Therefore, just like a human person requires more
than a heartbeat to operate, a database system needs as much as a DBMS to
work. You’ll discover come again what a DBMS is, whatever its elements
are, as well as how the DBMS works through into the record management
picture in the following section (DeWitt & Gray, 1992).
Now let us look at the five factors in Figure 1.7 in more detail (Zaniolo
et al., 1997):
• Hardware: Hardware includes all physical equipment in a
network, such as processors (Personal computers, workstations,
servers, and quantum computers), storage systems, printing,
network equipment (centers, switching, router, fiber optic), and
other components (automated teller machines (ATM), ID book
lovers, and so on) (Bonnet et al., 2001).
Source: https://www.slideshare.net/yhen06/database-system-environment-
ppt-14454678.
• Software Even though the DBMS has been the most well-known
piece of software, the database system would require three kinds
of software to work properly: an operational software program, a
DBMS, plus applications and tools.
• Operating System Software All hardware devices are managed,
and other such software can operate on the machines. Microsoft
Windows, Linux, Mac OS, UNIX, and VMS are samples of
operating systems.
Introduction to Database Systems 27
Source: https://docs.microsoft.com/en-us/sql/relational-databases/graphs/sql-
graph-architecture?view=sql-server-ver16.
A contemporary DBMS stores, not just data, but also associated data
input form or screen specifications, reporting meanings, validation criteria,
operational code, and frameworks to manage audiovisual and image formats,
among other belongings. Database performance optimization also requires
digital stowage administration (Jagadish et al., 2007).
Performance tuning mentions the movements that improve database
performance in terms of both storage and retrieval speed. Even though
the database appears to the user as a unified digital storage block, the data
is stored in a variety of physical file systems by the DBMS. (For further
information, see Figure 1.9.) These datasets can be saved on a variety of
storage mediums. As a result, the DBMS does not have to wait for one disk
demand to complete before moving on to another. In those other terms, the
DBMS can handle several database queries at the same time. In Chapter 11,
Performance Monitoring Engineering and Query Processing, you’ll learn
about digital storage control and business tuning (Chaudhuri & Narasayya,
2007).
• Data Transformation and Presentation: The folder organization
(DBMS) variations statistics such that it imitates the desirable
data structures. You don’t have to worry about an individual
between physical and Because the DBMS performs it just for
you, you don’t have to worry about logic types. That is, the
Introduction to Database Systems 31
Source: https://docs.oracle.com/cd/E11882_01/server.112/e10897/storage.htm.
All users should use a login and password or biometrics identification,
including a fingerprint reader, to log in with the database systems. That
information is used by the DBMS to give access rights to database elements
including searches and reporting (Jarke & Koch, 1984).
32 The Creation and Management of Database Systems
users to access the database via the Web using Web browsers like
Mozilla Firefox or Microsoft Internet Explorer. Interactions in
this setting may be performed in a variety of ways:
• Consumers may fill out screen forms using their favorite Net
browser to produce replies to enquiries.
• The DBMS may issue planned statistics on a webpage regularly.
• The DBMS may interconnect with third-party platforms to
direct material through e-mail or even other efficiency packages
(Ramakrishnan & Ullman, 1995).
34 The Creation and Management of Database Systems
REFERENCES
1. Abadi, D. J., Boncz, P. A., & Harizopoulos, S., (2009). Column-oriented
database systems. Proceedings of the VLDB Endowment, 2(2), 1664,
1665.
2. Abadi, D., Boncz, P., Harizopoulos, S., Idreos, S., & Madden, S.,
(2013). The design and implementation of modern column-oriented
database systems. Foundations and Trends® in Databases, 5(3), 197–
280.
3. Abadi, D., Madden, S., & Ferreira, M., (2006). Integrating compression
and execution in column-oriented database systems. In: Proceedings of
the 2006 ACM SIGMOD International Conference on Management of
Data (Vol. 1, pp. 671–682).
4. Adde, G., Chan, B., Duellmann, D., Espinal, X., Fiorot, A., Iven, J.,
& Sindrilaru, E. A., (2015). Latest evolution of EOS filesystem. In:
Journal of Physics: Conference Series (Vol. 608, No. 1, p. 012009).
IOP Publishing.
5. Alange, N., & Mathur, A., (2019). Small sized file storage problems in
Hadoop distributed file system. In: 2019 International Conference on
Smart Systems and Inventive Technology (ICSSIT) (Vol. 1, pp. 1202–
1206). IEEE.
6. Batini, C., & Scannapieco, M., (2016). Data and Information Quality
(Vol. 1, pp. 2–9). Cham, Switzerland: Springer International Publishing.
7. Becerik-Gerber, B., Siddiqui, M. K., Brilakis, I., El-Anwar, O., El-
Gohary, N., Mahfouz, T., & Kandil, A. A., (2014). Civil engineering
grand challenges: Opportunities for data sensing, information analysis,
and knowledge discovery. J. Comput. Civ. Eng., 28(4), 04014013.
8. Beets, G. L., Figueiredo, N. L., Habr-Gama, A., & Van De, V. C. J.
H., (2015). A new paradigm for rectal cancer: Organ preservation:
Introducing the international watch & wait database (IWWD).
European Journal of Surgical Oncology, 41(12), 1562–1564.
9. Bell, C., & Badanjak, S., (2019). Introducing PA-X: A new peace
agreement database and dataset. Journal of Peace Research, 56(3),
452–466.
10. Bissett, A., Fitzgerald, A., Meintjes, T., Mele, P. M., Reith, F., Dennis, P.
G., & Young, A., (2016). Introducing BASE: The biomes of Australian
soil environments soil microbial diversity database. Gigascience, 5(1),
s13742–016.
Introduction to Database Systems 35
11. Bitton, D., DeWitt, D. J., & Turbyfill, C., (1983). Benchmarking
Database Systems-A Systematic Approach (Vol. 1, pp. 3–9). University
of Wisconsin-Madison Department of Computer Sciences.
12. Blomer, J., Buncic, P., Meusel, R., Ganis, G., Sfiligoi, I., & Thain, D.,
(2015). The evolution of global scale filesystems for scientific software
distribution. Computing in Science & Engineering, 17(6), 61–71.
13. Bonnet, P., Gehrke, J., & Seshadri, P., (2001). Towards sensor database
systems. In: International Conference on Mobile Data Management
(Vol. 1, pp. 3–14). Springer, Berlin, Heidelberg.
14. Broatch, J. E., Dietrich, S., & Goelman, D., (2019). Introducing data
science techniques by connecting database concepts and dplyr. Journal
of Statistics Education, 27(3), 147–153.
15. Changnon, S. A., & Kunkel, K. E., (1999). Rapidly expanding uses of
climate data and information in agriculture and water resources: Causes
and characteristics of new applications. Bulletin of the American
Meteorological Society, 80(5), 821–830.
16. Chaudhuri, S., & Narasayya, V., (2007). Self-tuning database systems:
A decade of progress. In: Proceedings of the 33rd International
Conference on Very Large Data Bases (Vol. 1, pp. 3–14).
17. Chen, J. M., Norman, J. B., & Nam, Y., (2021). Broadening the stimulus
set: Introducing the American multiracial faces database. Behavior
Research Methods, 53(1), 371–389.
18. Chen, M., Ebert, D., Hagen, H., Laramee, R. S., Van, L. R., Ma, K. L., &
Silver, D., (2008). Data, information, and knowledge in visualization.
IEEE Computer Graphics and Applications, 29(1), 12–19.
19. Cheng, J., Greiner, R., Kelly, J., Bell, D., & Liu, W., (2002). Learning
Bayesian networks from data: An information-theory based approach.
Artificial Intelligence, 137(1, 2), 43–90.
20. Cole, J. R., Chai, B., Farris, R. J., Wang, Q., Kulam-Syed-Mohideen, A.
S., McGarrell, D. M., & Tiedje, J. M., (2007). The ribosomal database
project (RDP-II): Introducing myRDP space and quality controlled
public data. Nucleic Acids Research, 35(suppl_1), D169–D172.
21. Connoly, T., Begg, C., & Strachan, A., (1996, 2002). Database Systems
(Vol. 1, pp. 2–8). Addison-Wesley.
22. Cox, A., Doell, R. R., & Dalrymple, G. B., (1964). Reversals of the
earth’s magnetic field: Recent paleomagnetic and geochronologic data
36 The Creation and Management of Database Systems
34. Grimm, E. C., Bradshaw, R. H., Brewer, S., Flantua, S., Giesecke,
T., Lézine, A. M., & Williams, Jr. J. W., (2013). Databases and Their
Application, 1, 3–7.
35. Güting, R. H., (1994). An introduction to spatial database systems. The
VLDB Journal, 3(4), 357–399.
36. Heidemann, J. S., & Popek, G. J., (1994). File-system development
with stackable layers. ACM Transactions on Computer Systems
(TOCS), 12(1), 58–89.
37. Herodotou, H., (2016). Towards a distributed multi-tier file system for
cluster computing. In: 2016 IEEE 32nd International Conference on
Data Engineering Workshops (ICDEW) (Vol. 1, pp. 131–134). IEEE.
38. Hübner, D. C., (2016). The ‘national decisions’ database (Dec. Nat):
Introducing a database on national courts’ interactions with European
law. European Union Politics, 17(2), 324–339.
39. Jagadish, H. V., Chapman, A., Elkiss, A., Jayapandian, M., Li, Y.,
Nandi, A., & Yu, C., (2007). Making database systems usable. In:
Proceedings of the 2007 ACM SIGMOD International Conference on
Management of Data (Vol. 1, pp. 13–24).
40. Jarke, M., & Koch, J., (1984). Query optimization in database systems.
ACM Computing Surveys (CsUR), 16(2), 111–152.
41. Jin, S., Yang, S., Zhu, X., & Yin, H., (2012). Design of a trusted file
system based on Hadoop. In: International Conference on Trustworthy
Computing and Services (Vol. 1, pp. 673–680). Springer, Berlin,
Heidelberg.
42. Johnson, J. E., & Laing, W. A., (1996). Overview of the spiralog file
system. Digital Technical Journal, 8, 5–14.
43. Johnson, J., (2021). Introducing the military mutinies and defections
database (MMDD), 1945–2017. Journal of Peace Research, 58(6),
1311–1319.
44. Joshi, M., & Darby, J., (2013). Introducing the peace accords matrix
(PAM): A database of comprehensive peace agreements and their
implementation, 1989–2007. Peacebuilding, 1(2), 256–274.
45. Jukic, N., Vrbsky, S., Nestorov, S., & Sharma, A., (2014). Database
Systems: Introduction to Databases and Data Warehouses (Vol. 1, p.
400). Pearson.
46. Kakoulli, E., & Herodotou, H., (2017). OctopusFS: A distributed file
system with tiered storage management. In: Proceedings of the 2017
38 The Creation and Management of Database Systems
57. Liao, H., Han, J., & Fang, J., (2010). Multi-dimensional index on
Hadoop distributed file system. In: 2010 IEEE Fifth International
Conference on Networking, Architecture, and Storage (Vol. 1, pp.
240–249). IEEE.
58. Lin, H. Y., Shen, S. T., Tzeng, W. G., & Lin, B. S. P., (2012). Toward
data confidentiality via integrating hybrid encryption schemes and
Hadoop distributed file system. In: 2012 IEEE 26th International
Conference on Advanced Information Networking and Applications
(Vol. 1, pp. 740–747). IEEE.
59. Lu, Y., Shu, J., Chen, Y., & Li, T., (2017). Octopus: An {RDMA-
enabled} distributed persistent memory file system. In: 2017 USENIX
Annual Technical Conference (USENIX ATC 17) (Vol. 1, pp. 773–785).
60. Madnick, S. E., Wang, R. Y., Lee, Y. W., & Zhu, H., (2009). Overview
and framework for data and information quality research. Journal of
Data and Information Quality (JDIQ), 1(1), 1–22.
61. Magoutis, K., Addetia, S., Fedorova, A., Seltzer, M. I., Chase, J. S.,
Gallatin, A. J., & Gabber, E., (2002). Structure and performance of the
direct access file system. Management, 21, 31.
62. Mahmoud, H., Hegazy, A., & Khafagy, M. H., (2018). An approach
for big data security based on Hadoop distributed file system. In:
2018 International Conference on Innovative Trends in Computer
Engineering (ITCE) (Vol. 1, pp. 109–114). IEEE.
63. Maneas, S., & Schroeder, B., (2018). The evolution of the Hadoop
distributed file system. In: 2018 32nd International Conference on
Advanced Information Networking and Applications Workshops
(WAINA) (Vol. 1, pp. 67–74). IEEE.
64. Martinikorena, I., Cabeza, R., Villanueva, A., & Porta, S., (2018).
Introducing i2head database. In: Proceedings of the 7th Workshop on
Pervasive Eye Tracking and Mobile Eye-Based Interaction (Vol. 1, pp.
1–7).
65. McKelvey, R. D., & Ordeshook, P. C., (1985). Elections with limited
information: A fulfilled expectations model using contemporaneous
poll and endorsement data as information sources. Journal of Economic
Theory, 36(1), 55–85.
66. McKusick, M. K., & Quinlan, S., (2009). GFS: Evolution on fast-
forward: A discussion between kirk McKusick and Sean Quinlan About
the origin and evolution of the google file system. Queue, 7(7), 10–20.
40 The Creation and Management of Database Systems
67. McKusick, M. K., Joy, W. N., Leffler, S. J., & Fabry, R. S., (1984). A
fast file system for UNIX. ACM Transactions on Computer Systems
(TOCS), 2(3), 181–197.
68. Menon, J., Pease, D. A., Rees, R., Duyanovich, L., & Hillsberg, B.,
(2003). IBM storage tank—A heterogeneous scalable SAN file system.
IBM Systems Journal, 42(2), 250–267.
69. Merceedi, K. J., & Sabry, N. A., (2021). A comprehensive survey for
Hadoop distributed file system. Asian Journal of Research in Computer
Science, 1, 4–7.
70. Mukhopadhyay, D., Agrawal, C., Maru, D., Yedale, P., & Gadekar, P.,
(2014). Addressing name node scalability issue in Hadoop distributed
file system using cache approach. In: 2014 International Conference
on Information Technology (Vol. 1, pp. 321–326). IEEE.
71. Oldfield, R., & Kotz, D., (2001). Armada: A parallel file system for
computational grids. In: Proceedings First IEEE/ACM International
Symposium on Cluster Computing and the Grid (Vol. 1, pp. 194–201).
IEEE.
72. Ovsiannikov, M., Rus, S., Reeves, D., Sutter, P., Rao, S., & Kelly,
J., (2013). The Quantcast file system. Proceedings of the VLDB
Endowment, 6(11), 1092–1101.
73. Özsu, M. T., & Valduriez, P., (1996). Distributed and parallel database
systems. ACM Computing Surveys (CSUR), 28(1), 125–128.
74. Özsu, M. T., & Valduriez, P., (1999). Principles of Distributed Database
Systems (Vol. 2, pp. 1–5). Englewood Cliffs: Prentice Hall.
75. Pal, A., & Memon, N., (2009). The evolution of file carving. IEEE
Signal Processing Magazine, 26(2), 59–71.
76. Paton, N. W., & Diaz, O., (1999). Active database systems. ACM
Computing Surveys (CSUR), 31(1), 63–103.
77. Prabhakaran, V., Arpaci-Dusseau, A. C., & Arpaci-Dusseau, R. H.,
(2005). Analysis and evolution of journaling file systems. In: USENIX
Annual Technical Conference, General Track (Vol. 194, pp. 196–215).
78. Rabitti, F., Bertino, E., Kim, W., & Woelk, D., (1991). A model of
authorization for next-generation database systems. ACM Transactions
on Database Systems (TODS), 16(1), 88–131.
79. Ramakrishnan, R., & Ullman, J. D., (1995). A survey of deductive
database systems. The Journal of Logic Programming, 23(2), 125–149.
Introduction to Database Systems 41
80. Ramesh, D., Patidar, N., Kumar, G., & Vunnam, T., (2016). Evolution and
analysis of distributed file systems in cloud storage: Analytical survey.
In: 2016 International Conference on Computing, Communication and
Automation (ICCCA) (Vol. 1, pp. 753–758). IEEE.
81. Rapps, S., & Weyuker, E. J., (1985). Selecting software test data using
data flow information. IEEE Transactions on Software Engineering,
(4), 367–375.
82. Rosselló-Móra, R., Trujillo, M. E., & Sutcliffe, I. C., (2017).
Introducing a digital protologue: A timely move towards a database-
driven systematics of archaea and bacteria. Antonie Van Leeuwenhoek,
110(4), 455–456.
83. Salunkhe, R., Kadam, A. D., Jayakumar, N., & Thakore, D., (2016).
In search of a scalable file system state-of-the-art file systems review
and map view of new scalable file system. In: 2016 International
Conference on Electrical, Electronics, and Optimization Techniques
(ICEEOT) (Vol. 1, pp. 364–371). IEEE.
84. Saurabh, A., & Parikh, S. M., (2021). Evolution of distributed file
system and Hadoop: A mathematical appraisal. Recent Advances in
Mathematical Research and Computer Science, 2, 105–112.
85. Schultze, U., & Avital, M., (2011). Designing interviews to generate rich
data for information systems research. Information and Organization,
21(1), 1–16.
86. Shafer, J., Rixner, S., & Cox, A. L., (2010). The Hadoop distributed
filesystem: Balancing portability and performance. In: 2010 IEEE
International Symposium on Performance Analysis of Systems &
Software (ISPASS) (Vol. 1, pp. 122–133). IEEE.
87. Sidorov, J., Shull, R., Tomcavage, J., Girolami, S., Lawton, N., &
Harris, R., (2002). Does diabetes disease management save money
and improve outcomes? A report of simultaneous short-term savings
and quality improvement associated with a health maintenance
organization–sponsored disease management program among patients
fulfilling health employer data and information set criteria. Diabetes
Care, 25(4), 684–689.
88. Sigmund, M., (2006). Introducing the database exam stress for speech
under stress. In: Proceedings of the 7th Nordic Signal Processing
Symposium-NORSIG 2006 (Vol. 1, pp. 290–293). IEEE.
42 The Creation and Management of Database Systems
89. Silberschatz, A., Stonebraker, M., & Ullman, J., (1991). Database
systems: Achievements and opportunities. Communications of the
ACM, 34(10), 110–120.
90. Sivaraman, E., & Manickachezian, R., (2014). High performance and
fault tolerant distributed file system for big data storage and processing
using Hadoop. In: 2014 International Conference on Intelligent
Computing Applications (Vol. 1, pp. 32–36). IEEE.
91. Smith, K. A., & Seltzer, M. I., (1997). File system aging—increasing
the relevance of file system benchmarks. In: Proceedings of the 1997
ACM SIGMETRICS International Conference on Measurement and
Modeling of Computer Systems (Vol. 1, pp. 203–213).
92. Stefanidis, K., Koutrika, G., & Pitoura, E., (2011). A survey on
representation, composition and application of preferences in database
systems. ACM Transactions on Database Systems (TODS), 36(3),
1–45.
93. Stowe, L. L., Ignatov, A. M., & Singh, R. R., (1997). Development,
validation, and potential enhancements to the second‐generation
operational aerosol product at the national environmental satellite,
data, and information service of the national oceanic and atmospheric
administration. Journal of Geophysical Research: Atmospheres,
102(D14), 16923–16934.
94. Tamura, H., & Yokoya, N., (1984). Image database systems: A survey.
Pattern Recognition, 17(1), 29–43.
95. Tatebe, O., Hiraga, K., & Soda, N., (2010). Gfarm grid file system.
New Generation Computing, 28(3), 257–275.
96. Thomson, A., & Abadi, D. J., (2010). The case for determinism in
database systems. Proceedings of the VLDB Endowment, 3(1, 2), 70–
80.
97. Thomson, G. H., (1996). The DIPPR® databases. International Journal
of Thermophysics, 17(1), 223–232.
98. Tiirikka, T., & Moilanen, J. S., (2015). Human chromosome Y and
haplogroups; introducing YDHS database. Clinical and Translational
Medicine, 4(1), 1–9.
99. Tolar, B., Joseph, L. A., Schroeder, M. N., Stroika, S., Ribot, E. M.,
Hise, K. B., & Gerner-Smidt, P., (2019). An overview of PulseNet USA
databases. Foodborne Pathogens and Disease, 16(7), 457–462.
Introduction to Database Systems 43
100. Urvoy, M., Barkowsky, M., Cousseau, R., Koudota, Y., Ricorde, V., Le
Callet, P., & Garcia, N., (2012). NAMA3DS1-COSPAD1: Subjective
video quality assessment database on coding conditions introducing
freely available high quality 3D stereoscopic sequences. In: 2012
Fourth International Workshop on Quality of Multimedia Experience
(Vol. 1, pp. 109–114). IEEE.
101. Valduriez, P., (1993). Parallel database systems: Open problems and
new issues. Distributed and Parallel Databases, 1(2), 137–165.
102. Van, R. C. J., (1977). A theoretical basis for the use of co‐occurrence
data in information retrieval. Journal of Documentation, 1, 3–9.
103. Veeraiah, D., & Rao, J. N., (2020). An efficient data duplication
system based on Hadoop distributed file system. In: 2020 International
Conference on Inventive Computation Technologies (ICICT) (Vol. 1,
pp. 197–200). IEEE.
104. Wang, L., Ma, Y., Zomaya, A. Y., Ranjan, R., & Chen, D., (2014).
A parallel file system with application-aware data layout policies
for massive remote sensing image processing in digital earth. IEEE
Transactions on Parallel and Distributed Systems, 26(6), 1497–1508.
105. Welch, B., Unangst, M., Abbasi, Z., Gibson, G. A., Mueller, B., Small,
J., & Zhou, B., (2008). Scalable performance of the panasas parallel
file system. In: FAST (Vol. 8, pp. 1–17).
106. Yoon, S. H., Ha, S. M., Kwon, S., Lim, J., Kim, Y., Seo, H., &
Chun, J., (2017). Introducing EzBioCloud: A taxonomically united
database of 16S rRNA gene sequences and whole-genome assemblies.
International Journal of Systematic and Evolutionary Microbiology,
67(5), 1613.
107. Zaniolo, C., Ceri, S., Faloutsos, C., Snodgrass, R. T., Subrahmanian, V.
S., & Zicari, R., (1997). Advanced Database Systems (Vol. 1, pp. 4–9).
Morgan Kaufmann.
108. Zhang, J., Shu, J., & Lu, Y., (2016). {ParaFS}: A {log-structured} file
system to exploit the internal parallelism of flash devices. In: 2016
USENIX Annual Technical Conference (USENIX ATC 16) (Vol. 1, pp.
87–100).
109. Zhulin, I. B., (2015). Databases for microbiologists. Journal of
Bacteriology, 197(15), 2458–2467.
110. Zins, C., (2007). Conceptual approaches for defining data, information,
and knowledge. Journal of the American Society for Information
Science and Technology, 58(4), 479–493.
CHAPTER 2
DATA MODELS
CONTENTS
2.1. Introduction....................................................................................... 46
2.2. Importance of Data Models............................................................... 47
2.3. Data Model Basic Building Blocks..................................................... 48
2.4. Business Rules................................................................................... 50
2.5. The Evolution of Data Models............................................................ 54
References................................................................................................ 66
46 The Creation and Management of Database Systems
2.1. INTRODUCTION
When designing a database, the primary emphasis is already on the data
structures and how they will be utilized to store records for end-users. The
very first phase in building a database is known as data modeling, and it
relates to the procedure of establishing a unique data representation for a
particular issue domain. (A proposed approach is a very well-defined region
inside the real-world situation which is to be methodically handled. It
also has well-defined scope and bounds) (Mullahy, 1986). An information
model is an excellent simple depiction, often in graphical form, of more
intricate data structures that exist in the actual world. Any model is, in its
most fundamental sense, an approximation of a more complicated real-
world phenomenon or occurrence. The primary purpose of a model is to
improve one’s ability to comprehend the intricacies of the ecosystem that
exists. An information model is an example of data structures together
with their attributes, relationships, restrictions, transforms, as well as other
constructs that are used within the context of a database system to assist with
a particular problem area (Peckham & Maryanski, 1988).
The process of data modeling may be thought of as iterative and
continuous. You begin with a basic comprehension of the issue domain, but
as your knowledge of the given problem grows, so will the degree of detail
inside the data structure that you create. If everything is done correctly, the
resulting data structure will serve as a “blueprint” that contains all of the
directions necessary to construct a database that satisfies the needs of the
end-users. This design is both story and visual, which means that it includes
not just text explanations written in clear, straightforward language but also
diagrams that are both completely obvious and helpful and that illustrate the
primary data pieces (Brodie, 1984; Blundell et al., 2002).
In the past, database designers would rely on their sound judgments to
assist them in the process of developing a reliable data model. Unfortuitously,
having sound judgment is frequently in the eyes of society, and it frequently
emerges because of a great deal of practice and the accumulation of errors.
If all the participants in this class were given the assignment of developing a
database structure for a video shop, for instance, it is quite possible that every
one of them would come up with an original model for the business (Bond,
2002; Hellerstein & Mendelsohn, 1993). Whichever one of these would be
the appropriate choice? The straightforward response is “one which satisfies
all the needs of the end-user,” however there could be more than the right
option! The possibility for mistakes in database modeling has, thankfully,
Data Models 47
Entities might be actual items like consumers or goods, but they can
also be abstract concepts like airline paths or musical performances. Every
entity’s property is one of its characteristics. For instance, properties
including such customers’ last surname, customer initial name, consumer
telephone, customer location, and customer’s credit limitation might be used
to define a Consumer entity. With file systems, properties are the counterpart
of fields (Chang et al., 2017).
A relationship is a term used to indicate a connection between two or
more things. Clients with agents, for instance, have a connection that can
be listed as follows: a single agent can service a large number of customers,
and each consumer may be handled by a single agent. Individual, numerous,
and one-to-one connections are used in data structures. These abbreviated
mnemonic devices 1:M or 1‥*, M: N or *‥*, and 1:1 or 1‥1 are often
used by application developers. (While the M: N sign is the most common
labeling and for so many connections, the tag M: M can also be used.) The
differences between the three are seen in the following instances (Sudan,
2005).
• One-to-many (1:M or 1…*) relationship. A painter creates a
variety of paintings, yet each will be created by a single artist.
As a result, the painters (the “single”) and the paintings (the
“numerous”) are linked. As a result, data analysts provide a 1:M
value to the association “Artists paints Portrait.” (It’s worth noting
that organization names are frequently capitalized as a practice to
make them stand out.) A client (the “one”) may create a large
number of bills, but each statement (the “several”) is produced
by an individual client. The connection “Consumer produces
Receipt” would likewise be designated 1:M (Monakova et al.,
2009).
• Many-to-many (M:N or *…*) relationship. Every worker
may acquire a variety of work skills, so each professional skill
can be learnt by a large number of people. The connection
“Individual learns SKILL” is labeled M: N by system developers.
Consequently, a student may enroll in several courses, and each
classroom can enroll multiple students, resulting in the M: N
connection identifier for the connection described by “STUDENT
attends CLASS.”
• One-to-one (1:1 or 1…1) relationship. Each of a retailer’s
storefronts may be handled by a single worker, depending on the
50 The Creation and Management of Database Systems
the findings to verify that the business requirements are correct and suitable
(Herbst et al., 1994).
For various reasons, the act of discovering and documenting business
requirements is critical to database configuration (Wan-Kadir & Loucopoulos,
2004):
• They aid in the standardization of the business information
perspective.
• They may be used as a means of communication between
consumers and designers.
• They enable the designer to comprehend the information’s nature,
function, and scope.
• They make it possible for the designer to comprehend business
operations.
• They enable the designer to establish a reliable data description
and define suitable relationship participation criteria and
limitations.
Not even all instructions, of obviously, can be represented. A business
rule such as “no pilot may fly and over 10 hours in just about any period of
24 hours” could be represented, for instance. The software systems, on the
other hand, may implement such a business rule (Zur Muehlen & Indulska,
2010).
id, and the CREDIT LIMIT denotes that the values in the property will
be straightforward to detect. Whenever we address the necessity to utilize
common properties to indicate connections between objects in a subsequent
section, this becomes more significant. The capacity of the data structure
to promote communication among some of the architects, application
developers, and end consumers will increase with the implementation of a
correct filename. Using a consistent naming standard might help your model
become a personality (Grosof et al., 1999).
Source: https://launchschool.com/books/sql/read/table_relationships.
However, if the consumer data is saved in one database as well as the
sales consultant data is maintained in another, having a common connection
between the Client and AGENT columns involves comparing the consumer
with his or her sales consultant. For instance, you may quickly discover
that consumer Dunne’s representative is Alex Alby since the CUSTOMER
table’s AGENT CODE is 501, which corresponds to the AGENT table’s
AGENT CODE (Elith et al., 2010).
Even though the tables are independent of each other, the data may
simply be linked between them. The relationship approach offers a regulated
amount of redundancy that eliminates most of the inconsistencies seen in
data files (Schilthuizen & Davison, 2005).
In such a relational schema, the connection type (1:1, 1:M, or M: N) is
frequently displayed, as seen in Figure 2.2. A connection diagram depicts the
58 The Creation and Management of Database Systems
Source: https://www.nsf.gov/news/mmg/mmg_disp.jsp?med_id=79315.
A collection of connected items is stored in a relational table. In
this way, a relational data table is similar to a file. However, there’s one
significant distinction between such a table as well as a file: Because this
is a purely rational design, a table provides access to all information and
architectural independence. Both user and the developer are unconcerned
with how the information is kept in the databases; what matters that’s how
the information is seen. And this aspect of a relational schema, which will
be discussed in further subsequent chapters, became the catalyst for a true
database revolution (Schönrich & Binney, 2009).
The traditional relational model’s prominence is also due to its strong
and flexible programming language. The programming language like most
Data Models 59
Source: http://www.myreadingroom.co.in/notes-and-studymaterial/65-
dbms/471-the-entity-relationship-model.html.
The ER model is the most popular database modeling and designing
tool because of its unparalleled visual clarity. Nonetheless, even as the data
environment evolves, the hunt for new relevant data continues (Moser et al.,
2011).
Source: http://www.differencebetween.info/difference-between-uml-and-erd.
Take note of the following as you study Figure 2.4 (Manatschal, 2004):
• The INVOICE’s item format has all linked items in the same
item box. It’s worth noting that perhaps the strong positive
correlation (1 and M) denotes the associated items’ connection
to the INVOICE. The 1 beside the CUSTOMER object, for
instance, shows so each INVOICE is associated with just one
CUSTOMER. Every INVOICE has numerous LINEs, as shown
by the M besides the LINE objects.
Data Models 65
REFERENCES
1. Andreozzi, S., Burke, S., Field, L., & Konya, B., (2008). Towards
GLUE 2: Evolution of the computing element information model. In:
Journal of Physics: Conference Series (Vol. 119, No. 6, p. 062009).
IOP Publishing.
2. Araujo‐Pradere, E. A., (2009). Transitioning space weather models into
operations: The basic building blocks. Space Weather, 7(10), 33–40.
3. Aubry, K. B., Raley, C. M., & McKelvey, K. S., (2017). The importance
of data quality for generating reliable distribution models for rare,
elusive, and cryptic species. PLoS One, 12(6), e0179152.
4. Bachman, C. W., & Daya, M., (1977). The role concept in data models.
In: Proceedings of the Third International Conference on Very Large
Data Bases (Vol. 1, pp. 464–476).
5. Bajec, M., & Krisper, M., (2005). A methodology and tool support for
managing business rules in organizations. Information Systems, 30(6),
423–443.
6. Blaschka, M., Sapia, C., & Höfling, G., (1999). On schema evolution
in multidimensional databases. In: International Conference on
Data Warehousing and Knowledge Discovery (Vol. 1, pp. 153–164).
Springer, Berlin, Heidelberg.
7. Blundell, R., & Bond, S., (1998). Initial conditions and moment
restrictions in dynamic panel data models. Journal of Econometrics,
87(1), 115–143.
8. Blundell, R., Griffith, R., & Van, R. J., (1999). Market share, market
value and innovation in a panel of British manufacturing firms. The
Review of Economic Studies, 66(3), 529–554.
9. Blundell, R., Griffith, R., & Windmeijer, F., (2002). Individual effects
and dynamics in count data models. Journal of Econometrics, 108(1),
113–131.
10. Bolker, B. M., Brooks, M. E., Clark, C. J., Geange, S. W., Poulsen, J.
R., Stevens, M. H. H., & White, J. S. S., (2009). Generalized linear
mixed models: A practical guide for ecology and evolution. Trends in
Ecology & Evolution, 24(3), 127–135.
11. Bond, S. R., (2002). Dynamic panel data models: A guide to micro data
methods and practice. Portuguese Economic Journal, 1(2), 141–162.
12. Brodie, M. L., (1984). On the development of data models. In: On
Conceptual Modeling (Vol. 1, pp. 19–47). Springer, New York, NY.
Data Models 67
13. Brown, J. M., & Lemmon, A. R., (2007). The importance of data
partitioning and the utility of Bayes factors in Bayesian phylogenetics.
Systematic Biology, 56(4), 643–655.
14. Calvet, L. L., & Juan, P. Á. A., (2015). Educational data mining
and learning analytics: Differences, similarities, and time evolution.
International Journal of Educational Technology in Higher Education,
12(3), 98–112.
15. Chang, K. C., Dutta, S., Mirams, G. R., Beattie, K. A., Sheng, J., Tran, P.
N., & Li, Z., (2017). Uncertainty quantification reveals the importance
of data variability and experimental design considerations for in silico
proarrhythmia risk assessment. Frontiers in Physiology, 1, 917.
16. Charfi, A., & Mezini, M., (2004). Hybrid web service composition:
Business processes meet business rules. In: Proceedings of the 2nd
International Conference on Service Oriented Computing (Vol. 1, pp.
30–38).
17. Collins, A. G., Schuchert, P., Marques, A. C., Jankowski, T., Medina,
M., & Schierwater, B., (2006). Medusozoan phylogeny and character
evolution clarified by new large and small subunit rDNA data and an
assessment of the utility of phylogenetic mixture models. Systematic
Biology, 55(1), 97–115.
18. D’Ambros, M., Gall, H., Lanza, M., & Pinzger, M., (2008). Analyzing
software repositories to understand software evolution. In: Software
Evolution (Vol. 1, pp. 37–67). Springer, Berlin, Heidelberg.
19. Demuth, B., Hussmann, H., & Loecher, S., (2001). OCL as a
specification language for business rules in database applications. In:
International Conference on the Unified Modeling Language (Vol. 1,
pp. 104–117). Springer, Berlin, Heidelberg.
20. Elhorst, J. P., (2014). Spatial panel data models. In: Spatial Econometrics
(Vol. 1, pp. 37–93). Springer, Berlin, Heidelberg.
21. Elith, J., Kearney, M., & Phillips, S., (2010). The art of modelling
range‐shifting species. Methods in Ecology and Evolution, 1(4), 330–
342.
22. Falk, E. B., & Bassett, D. S., (2017). Brain and social networks:
Fundamental building blocks of human experience. Trends in Cognitive
Sciences, 21(9), 674–690.
23. Feeley, K. J., & Silman, M. R., (2010). Modelling the responses of
Andean and Amazonian plant species to climate change: The effects of
68 The Creation and Management of Database Systems
34. Ingram, T., & Mahler, D. L., (2013). SURFACE: Detecting convergent
evolution from comparative data by fitting Ornstein‐Uhlenbeck models
with stepwise Akaike information criterion. Methods in Ecology and
Evolution, 4(5), 416–425.
35. Kardasis, P., & Loucopoulos, P., (2004). Expressing and organizing
business rules. Information and Software Technology, 46(11), 701–718.
36. Kiviet, J. F., (1995). On bias, inconsistency, and efficiency of various
estimators in dynamic panel data models. Journal of Econometrics,
68(1), 53–78.
37. Knolmayer, G., Endl, R., & Pfahrer, M., (2000). Modeling processes
and workflows by business rules. In: Business Process Management
(Vol. 1, pp. 16–29). Springer, Berlin, Heidelberg.
38. Kumar, K., & Van, H. J., (2000). ERP experiences and evolution.
Communications of the ACM, 43(4), 22–22.
39. Liu, C., Mao, Y., Van, D. M. J., & Fernandez, M., (2011). Cloud
resource orchestration: A data-centric approach. In: Proceedings of
the Biennial Conference on Innovative Data Systems Research (CIDR)
(Vol. 1, pp. 1–8).
40. Lynch, V. J., (2007). Inventing an arsenal: Adaptive evolution and
neofunctionalization of snake venom phospholipase A2 genes. BMC
Evolutionary Biology, 7(1), 1–14.
41. Makarova, K. S., Wolf, Y. I., & Koonin, E. V., (2013). The basic
building blocks and evolution of CRISPR–Cas systems. Biochemical
Society Transactions, 41(6), 1392–1400.
42. Manatschal, G., (2004). New models for evolution of magma-poor
rifted margins based on a review of data and concepts from west Iberia
and the Alps. International Journal of Earth Sciences, 93(3), 432–466.
43. Manegold, S., Kersten, M. L., & Boncz, P., (2009). Database architecture
evolution: Mammals flourished long before dinosaurs became extinct.
Proceedings of the VLDB Endowment, 2(2), 1648–1653.
44. Manel, S., Williams, H. C., & Ormerod, S. J., (2001). Evaluating
presence–absence models in ecology: The need to account for
prevalence. Journal of Applied Ecology, 38(5), 921–931.
70 The Creation and Management of Database Systems
45. Masud, M. M., Chen, Q., Khan, L., Aggarwal, C., Gao, J., Han, J., &
Thuraisingham, B., (2010). Addressing concept-evolution in concept-
drifting data streams. In: 2010 IEEE International Conference on Data
Mining (Vol. 1, pp. 929–934). IEEE.
46. McLennan, S. M., & Taylor, S. R., (1980). Th and U in sedimentary
rocks: Crustal evolution and sedimentary recycling. Nature, 285(5767),
621–624.
47. Monakova, G., Kopp, O., Leymann, F., Moser, S., & Schäfers, K.,
(2009). Verifying business rules using an SMT solver for BPEL
processes. Business Process, Services–Computing and Intelligent
Service Management, 1, 2–8.
48. Moonen, N. N., Flood, A. H., Fernández, J. M., & Stoddart, J. F.,
(2005). Towards a rational design of molecular switches and sensors
from their basic building blocks. Molecular Machines, 1, 99–132.
49. Moser, T., Mordinyi, R., Winkler, D., Melik-Merkumians, M., & Biffl,
S., (2011). Efficient automation systems engineering process support
based on semantic integration of engineering knowledge. In: ETFA2011
(Vol. 1, pp. 1–8). IEEE.
50. Mullahy, J., (1986). Specification and testing of some modified count
data models. Journal of Econometrics, 33(3), 341–365.
51. Navathe, S. B., (1992). Evolution of data modeling for databases.
Communications of the ACM, 35(9), 112–123.
52. Nemuraite, L., Skersys, T., Sukys, A., Sinkevicius, E., & Ablonskis,
L., (2010). VETIS tool for editing and transforming SBVR business
vocabularies and business rules into UML&OCL models. In: 16th
International Conference on Information and Software Technologies,
Kaunas: Kaunas University of Technology (Vol. 1, pp. 377–384).
53. Peckham, J., & Maryanski, F., (1988). Semantic data models. ACM
Computing Surveys (CSUR), 20(3), 153–189.
54. Pinzger, M., Gall, H., Fischer, M., & Lanza, M., (2005). Visualizing
multiple evolution metrics. In: Proceedings of the 2005 ACM
Symposium on Software Visualization (Vol. 1, pp. 67–75).
55. Pulparambil, S., Baghdadi, Y., Al-Hamdani, A., & Al-Badawi,
M., (2017). Exploring the main building blocks of SOA method:
SOA maturity model perspective. Service Oriented Computing and
Applications, 11(2), 217–232.
Data Models 71
56. Robins, J. M., Rotnitzky, A., & Zhao, L. P., (1995). Analysis of
semiparametric regression models for repeated outcomes in the
presence of missing data. Journal of the American Statistical
Association, 90(429), 106–121.
57. Rosca, D., Greenspan, S., Feblowitz, M., & Wild, C., (1997). A
decision making methodology in support of the business rules lifecycle.
In: Proceedings of ISRE’97: 3rd IEEE International Symposium on
Requirements Engineering (Vol. 1, pp. 236–246). IEEE.
58. Rosenberg, F., & Dustdar, S., (2005). Business rules integration in
BPEL-a service-oriented approach. In: Seventh IEEE International
Conference on E-Commerce Technology (CEC’05) (Vol. 1, pp. 476–
479). IEEE.
59. Sauter, T., (2007). The continuing evolution of integration in
manufacturing automation. IEEE Industrial Electronics Magazine,
1(1), 10–19.
60. Sauter, T., (2010). The three generations of field-level networks—
Evolution and compatibility issues. IEEE Transactions on Industrial
Electronics, 57(11), 3585–3595.
61. Schilthuizen, M., & Davison, A., (2005). The convoluted evolution of
snail chirality. Naturwissenschaften, 92(11), 504–515.
62. Schönrich, R., & Binney, J., (2009). Chemical evolution with radial
mixing. Monthly Notices of the Royal Astronomical Society, 396(1),
203–222.
63. Schwartz, R., & Schäffer, A. A., (2017). The evolution of tumor
phylogenetics: Principles and practice. Nature Reviews Genetics,
18(4), 213–229.
64. Staub, R. B., E Souza, G. D. S., & Tabak, B. M., (2010). Evolution
of bank efficiency in Brazil: A DEA approach. European Journal of
Operational Research, 202(1), 204–213.
65. Stearns, S. C., (1983). A natural experiment in life-history evolution:
Field data on the introduction of mosquitofish (Gambusia affinis) to
Hawaii. Evolution, 1, 601–617.
66. Sudan, R., (2005). The basic building blocks of e-government.
E-Development: From Excitement to Effectiveness, 1, 79–100.
67. Taveter, K., & Wagner, G., (2001). Agent-oriented enterprise modeling
based on business rules. In: International Conference on Conceptual
Modeling (Vol. 1, pp. 527–540). Springer, Berlin, Heidelberg.
72 The Creation and Management of Database Systems
68. Tekieh, M. H., & Raahemi, B., (2015). Importance of data mining
in healthcare: A survey. In: Proceedings of the 2015 IEEE/ACM
International Conference on Advances in Social Networks Analysis
and Mining 2015 (Vol. 1, pp. 1057–1062).
69. Van, E. T., Iacob, M. E., & Ponisio, M. L., (2008). Achieving business
process flexibility with business rules. In: 2008 12th International IEEE
Enterprise Distributed Object Computing Conference (Vol. 1, pp. 95–
104). IEEE.
70. Wan-Kadir, W. M., & Loucopoulos, P., (2004). Relating evolving
business rules to software design. Journal of Systems Architecture,
50(7), 367–382.
71. Warren, D. L., Glor, R. E., & Turelli, M., (2008). Environmental niche
equivalency versus conservatism: Quantitative approaches to niche
evolution. Evolution: International Journal of Organic Evolution,
62(11), 2868–2883.
72. Whitby, M., Pessoa-Silva, C. L., McLaws, M. L., Allegranzi, B., Sax,
H., Larson, E., & Pittet, D., (2007). Behavioral considerations for
hand hygiene practices: The basic building blocks. Journal of Hospital
Infection, 65(1), 1–8.
73. Wooldridge, J. M., (2005). Simple solutions to the initial conditions
problem in dynamic, nonlinear panel data models with unobserved
heterogeneity. Journal of Applied Econometrics, 20(1), 39–54.
74. Wu, X., Zhu, X., Wu, G. Q., & Ding, W., (2013). Data mining with big
data. IEEE Transactions on Knowledge and Data Engineering, 26(1),
97–107.
75. Yoder, A. D., & Yang, Z., (2000). Estimation of primate speciation
dates using local molecular clocks. Molecular Biology and Evolution,
17(7), 1081–1090.
76. Zinner, E., Nittler, L. R., Gallino, R., Karakas, A. I., Lugaro, M.,
Straniero, O., & Lattanzio, J. C., (2006). Silicon and carbon isotopic
ratios in AGB stars: SiC grain data, models, and the galactic evolution
of the Si isotopes. The Astrophysical Journal, 650(1), 350.
77. Zur, M. M., & Indulska, M., (2010). Modeling languages for business
processes and business rules: A representational analysis. Information
Systems, 35(4), 379–390.
CHAPTER 3
DATABASE ENVIRONMENT
CONTENTS
3.1. Introduction....................................................................................... 74
3.2. Three-Level Ansi-Sparc Architecture................................................... 74
3.3. Database Languages.......................................................................... 81
3.4. Conceptual Modeling and Data Models............................................. 86
3.5. Functions of a DBMS......................................................................... 91
3.6. Components of a DBMS.................................................................... 97
References.............................................................................................. 102
74 The Creation and Management of Database Systems
3.1. INTRODUCTION
The primary objective of a database system is to present clients with an
abstract picture of information, concealing the specifics of how it has been
managed and stored. Thus, the architecture of a database should begin with
an abstract and broad detail of the organization’s data needs that will be
reflected in the database. In this chapter, the term “organization” is used
generally to refer to the entire organization or a portion of it. In the case
study of Dream Home, for instance, we can be concerned with modeling
(Philip et al., 1992):
• Rental Property, Staff, Client, and Private Owner are ‘real-world’
elements;
• Every entity has characteristics that describe its characteristics
or features (for instance, Staff has a position, a name, and a pay)
(Yannakoudakis et al., 1999);
The connections that exist between such elements (For instance, Staff
Controls Rental Property) (Pieterse & Olivier, 2012).
In addition, because a database is a source that has been shared among
several users, every consumer may need a unique view of the information
that is stored in the database. Because of such requirements, the architecture
of many commercial database management systems (DBMSs) is based on
the ANSI-SPARC design. We will discuss several different functional and
architectural properties of DBMSs (Zdonik & Wegner, 1988).
Source: https://www.geeksforgeeks.org/the-three-level-ansi-sparc-architec-
ture/.
Between the exterior and interior levels, the conceptual level offers
both the mapping and the needed independence. The purpose of the 3-level
76 The Creation and Management of Database Systems
and the DBMS will determine the employee’s age when it was accessed
(Samos et al., 1998).
and differ from scheme to scheme. Certain DBMSs utilize several of the
OS access mechanisms, whilst others utilize only the fundamental ones and
develop their file structures. The physical level beneath the DBMS contains
information that is only known by the operating system, like how the
sequencing has been performed or if the fields of interior records are saved
as continuous bytes on the disk (Li & Wang, 2007).
Source: https://slideplayer.com/slide/14504100/.
Figure 3.2 depicts an illustration of the many levels. There are 2
alternative external views of employee information: one with the last name
(lName), first name (fName), age, staff number (sNo), and salary, and the
other with the last name (lName), a staff number (staffNo), and the number
of the branch where the employee works (branchNo) (Rossiter & Heather,
2005). Such external perspectives have been combined into a single
conceptual perspective. The main difference in this merging procedure is
that the age field is replaced with a DOB field. The DBMS keeps track of
the conceptual/external mapping; for instance, it translates the 1st external
view’s staffNo field to the conceptual record’s staffNo field. After that, the
conceptual level has been translated to the interior level, which includes a
physical detail of the conceptual record’s structure (Li et al., 2009).
At this level, the structure is defined using a higher-level language. The
structure has a reference, next, that enables the list of staff records to be
physically chained together. Remember that the inner order of fields differs
from the conceptual order. The database manages the internal or conceptual
mapping once more. This is essential to disintegrate between the database’s
80 The Creation and Management of Database Systems
description and the database itself. The database schema is the detail of the
database (Flender, 2010). During the database design phase, the schema is
determined and has not been intended to change regularly. Though, the actual
data in the database can change often, for instance, if we add information
on a new employee or property. A database instance refers to the data in the
database at a specific point in time. Consequently, several database examples
may correspond to a single database schema. The schema sometimes is
referred to as the database’s intention, whereas an instance is referred to as
the database’s extension (or state) (Cooper, 1995).
Source: https://www.researchgate.net/figure/Schemas-data-independence-in-
ANSI-SPARC-three-level-architecture_fig2_326468693.
It ought to be possible to make modifications to the conceptual schema,
such as removing or adding new items, attributes, or relationships, without
Database Environment 81
file has been subsequently built, stored in an object module, associated with
DBMS-specific library comprising the replacement functions, and performed
as necessary. The majority of data sublanguages also have interactive or
non-embedded instructions that may be entered directly from a terminal
(Bidoit, 1991).
screen components and other properties, like underline, reverse video, bold,
flashing, and so on, can be defined. The improved form generators enable
the construction of derived characteristics, such as those generated from
aggregates or arithmetic operators, as well as the definition of data input
validation checks (Tresch & Scholl, 1994).
to explain the data at the external and conceptual levels, whereas the third
has been utilized to explain data at the internal level (Trinder, 1990).
Source: https://www.researchgate.net/figure/Source-relational-schema-LI-
BRARY-REL_fig2_264458232.
Database Environment 89
Source: https://creately.com/blog/examples/network-diagram-templates-cre-
ately/.
Nonetheless, this view only refers to the database’s logical structure, for
example, the conceptual and external layers of the ANSI-SPARC design. It
doesn’t pertain to the database’s physical structure, which may be executed
utilizing several storage types (Roussopoulos & Karagiannis, 2009).
may be represented as tree graphs with records as nodes (or segments) and
sets as edges. Figure 3.6 shows a hierarchical framework for Figure 3.4’s
data. IMS from IBM is the primary hierarchical DBMS, however, it also
supports non-hierarchical functionality (Calvanese et al., 2009).
The general structure of the database and a high-level detail of the
execution are specified using record-based (logical) data models. Their
fundamental disadvantage is that they lack proper capabilities for explicitly
providing data constraints, while object-based data models cannot give
logical structure but give greater semantic content by enabling the client
to define data limitations. The relational paradigm underpins the bulk of
current commercial systems, while early database systems relied on either
hierarchical or network data models (Ram & Liu, 2006).
Source: https://www.geeksforgeeks.org/difference-between-hierarchical-and-
relational-data-model/.
The latter 2 methods need the client to be familiar with the actual database
being viewed, while the former offers significant data independence. As a
result, whereas relational systems use a declarative method for database
operations (for example, they describe what data should be obtained),
hierarchical, and network systems use a navigational method (In other
words, they indicate how the data should be obtained) (Borgida, 1986).
Database Environment 91
Source: https://www.educba.com/hierarchical-database-model/.
The deletion of a member of staff from the database and the transfer
of the responsibilities that were previously held by that individual to
another member of staff is an example of a more complex use case. Several
database variations need to be done in this situation. If the transaction fails
to complete, maybe due to a computer crash, the database would be in an
unstable state, with a few changes performed and others not. As a result, the
modifications made would have to be reversed to restore consistency to the
database (Nidzwetzki & Güting, 2015).
• Concurrency Control Services: When several consumers are
changing the database at the same time, the DBMS should provide
a means to verify that the database has been updated appropriately.
Using a DBMS to achieve many users simultaneously seeing
shared data is one of the primary aims that should be pursued
(Chakravarthy, 1989). When all consumers are doing nothing
more than reading the material, concurrent access is a very
straightforward process because there has been no way for them
to communicate with one another. The interruption can take place
when two or many customers access the database at the same
time, and at the very least, one of them is making changes to the
data. This can lead to inconsistencies in the information. Consider
2 transactions T1 and T2, which have been running at the same
time, as shown in Figure 3.7 (Khuan et al., 2008).
T1 withdraws £10 from an account (having a positive balance) and
T2 deposits £100 into a similar account. If such transactions had been
conducted sequentially, without any interleaving, the total balance will be
Database Environment 95
£190 irrespective of which had been executed initially. Thus, in this case,
transactions T1 and T2 begin almost simultaneously and both display a
balance of £100. T2 then raises balx by £100 to £200 and saves the database
modification. In the meantime, transaction T1 decrements its copy of balx
by £10 to £90 and puts this value in the database, thus “losing” £100. The
DBMS should assure that interference may not happen when numerous
consumers access the database simultaneously (Linnemann et al., 1988).
• Recovery Services: A DBMS should include a technique for
restoring the database if it becomes corrupted. When addressing
transaction support, we emphasized that the database must be
restored to a stable state when a transaction fails. It can be the
consequence of a media failure, a system crash, a software or
hardware issue forcing the DBMS to stop, or the consumer can
have detected an error and aborted the transaction before its
completion. In each of these circumstances, the DBMS should
provide a method for recovering the database to a stable state
(Zlatanova, 2006).
• Authorization Services: A DBMS should provide a means to
restrict database access to just authenticated persons. This is
not hard to imagine situations in which we will wish to restrict
access to part of the information stored. For instance, we can
require only branch managers to view salary-related data to
the employee and restrict access to this information to all other
consumers. Furthermore, we can wish to prevent illegal access
to the database. The phrase security relates to the safeguarding
of a database from unintended or inadvertent unwanted access.
We antedate that the DBMS would include tools to assure data
security (Isaac & Harikumar, 2016).
• Support for the Communication of Data: A DBMS should be
compatible with the software application. Many database clients
connect via workstations. Occasionally, such workstations have
been directly linked to the machine containing the DBMS. In
other instances, distant workstations connect with the machine
hosting the DBMS over a network. In both scenarios, the DBMS
receives requests as communications messages and reacts in
the same manner (Härder et al., 1987). A Data Communication
Manager (DCM) oversees all of these transfers. Even though
the DCM is not a component of the DBMS, the DBMS must
be able to integrate with many DCMs for the system to be
96 The Creation and Management of Database Systems
of that. As a result, the interaction between the DBMS and the operating
system should be considered while designing a DBMS. Figure 3.8 depicts
the primary software elements in a DBMS setup. This graphic depicts how
the DBMS interacts with other software elements including consumer
queries and access methods (Methods for managing files to store and
retrieve data records). We’ll go through how to organize your files and how
to access them. Weiderhold (1983), Fry, and Teorey (1982), Weiderhold
(1983), Ullman (1988), and Barnes and Smith (1987) recommended a more
extensive approach (Snodgrass, 1992).
Source: https://www.techtarget.com/searchdatamanagement/definition/data-
base-management-system.
Database Environment 99
Source: https://corporatefinanceinstitute.com/resources/knowledge/data-anal-
ysis/database/.
The following elements are depicted in Figure 3.8 (Hellerstein et al.,
2007):
• Query processor: this is a significant component of the DBMS
that converts queries into a set of lower-level commands that are
then sent to the database manager (DM).
• Database Manager (DM): The DM interacts with application
programs and questions sent by users. The DM takes queries
and looks at the external and conceptual schemas to see what
conceptual records are needed to fulfill the request. The DM then
contacts the file manager to complete the task. Figure 3.9 depicts
the elements of the DM (Härder et al., 1987).
100 The Creation and Management of Database Systems
REFERENCES
1. Aier, S., & Winter, R., (2009). Virtual decoupling for IT/business
alignment–conceptual foundations, architecture design and
implementation example. Business & Information Systems Engineering,
1(2), 150–163.
2. Andries, M., & Engels, G., (1994). Syntax and semantics of hybrid
database languages. In: Graph Transformations in Computer Science
(Vol. 1, pp. 19–36). Springer, Berlin, Heidelberg.
3. Aref, W. G., & Samet, H., (1991). Extending a DBMS with spatial
operations. In: Symposium on Spatial Databases (Vol. 1, pp. 297–318).
Springer, Berlin, Heidelberg.
4. Arens, C., Stoter, J., & Van, O. P., (2005). Modeling 3D spatial objects
in a geo-DBMS using a 3D primitive. Computers & Geosciences,
31(2), 165–177.
5. Arulraj, J., & Pavlo, A., (2017). How to build a non-volatile memory
database management system. In: Proceedings of the 2017 ACM
International Conference on Management of Data (Vol. 1, pp. 1753–
1758).
6. Atkinson, M. P., & Buneman, O. P., (1987). Types and persistence in
database programming languages. ACM Computing Surveys (CSUR),
19(2), 105–170.
7. Bach, M., & Werner, A., (2014). Standardization of NoSQL database
languages. In: International Conference: Beyond Databases,
Architectures and Structures (Vol. 1, pp. 50–60). Springer, Cham.
8. Badia, A., (2002). Conceptual modeling for semistructured data. In:
Web Information Systems Engineering Workshops, International
Conference (Vol. 1, pp. 160–170). IEEE Computer Society.
9. Batory, D., & Thomas, J., (1997). P2: A lightweight DBMS generator.
Journal of Intelligent Information Systems, 9(2), 107–123.
10. Bédard, Y., & Larrivée, S., (2008). Spatial database modeling with
pictrogrammic languages. Encyclopedia of GIS, 1, 716–725.
11. Bidoit, N., (1991). Negation in rule-based database languages: A
survey. Theoretical Computer Science, 78(1), 3–83.
12. Biller, H., (1982). On the architecture of a system integrating data base
management and information retrieval. In: International Conference
on Research and Development in Information Retrieval (Vol. 1, pp.
80–97). Springer, Berlin, Heidelberg.
Database Environment 103
67. Overmyer, S. P., Benoit, L., & Owen, R., (2001). Conceptual modeling
through linguistic analysis using LIDA. In: Proceedings of the 23rd
International Conference on Software Engineering: ICSE 2001 (Vol.
1, pp. 401–410). IEEE.
68. Philip, S. Y., Heiss, H. U., Lee, S., & Chen, M. S., (1992). On workload
characterization of relational database environments. IEEE Trans.
Software Eng., 18(4), 347–355.
69. Piatetsky-Shapiro, G., & Jakobson, G., (1987). An intermediate
database language and its rule-based transformation to different
database languages. Data & Knowledge Engineering, 2(1), 1–29.
70. Pieterse, H., & Olivier, M., (2012). Data hiding techniques for database
environments. In: IFIP International Conference on Digital Forensics
(Vol. 1, pp. 289–301). Springer, Berlin, Heidelberg.
71. Ram, S., & Liu, J., (2006). Understanding the semantics of data
provenance to support active conceptual modeling. In: International
Workshop on Active Conceptual Modeling of Learning (Vol. 1, pp. 17–
29). Springer, Berlin, Heidelberg.
72. Ramamohanarao, K., & Harland, J., (1994). An introduction to
deductive database languages and systems. VLDB J., 3(2), 107–122.
73. Robinson, S., (2011). Choosing the right model: Conceptual modeling
for simulation. In: Proceedings of the 2011 Winter Simulation
Conference (WSC) (Vol. 1, pp. 1423–1435). IEEE.
74. Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente,
I. M., & Galán, F., (2009). The reservoir model and architecture
for open federated cloud computing. IBM Journal of Research and
Development, 53(4), 4–1.
75. Romei, A., & Turini, F., (2011). Inductive database languages:
Requirements and examples. Knowledge and Information Systems,
26(3), 351–384.
76. Rossiter, B. N., & Heather, M. A., (2005). Conditions for interoperability.
In: ICEIS (1) (Vol. 1, pp. 92–99).
77. Roussopoulos, N., & Karagiannis, D., (2009). Conceptual modeling:
Past, present and the continuum of the future. In: Conceptual Modeling:
Foundations and Applications (Vol. 1, pp. 139–152). Springer, Berlin,
Heidelberg.
78. Samos, J., Saltor, F., & Sistac, J., (1998). Definition of derived classes
in OODBs. In: Proceedings. IDEAS’98. International Database
Database Environment 109
90. Vossen, G., (1991). Data Models, Database Languages and Database
Management Systems (Vol. 1, pp. 3–5). Addison-Wesley Longman
Publishing Co., Inc.
91. Wang, H., & Zaniolo, C., (1999). User-defined aggregates in database
languages. In: International Symposium on Database Programming
Languages (Vol. 1, pp. 43–60). Springer, Berlin, Heidelberg.
92. Wang, W., & Brooks, R. J., (2007). Empirical investigations of
conceptual modeling and the modeling process. In: 2007 Winter
Simulation Conference (Vol. 1, pp. 762–770). IEEE.
93. Yannakoudakis, E. J., Tsionos, C. X., & Kapetis, C. A., (1999). A new
framework for dynamically evolving database environments. Journal
of Documentation, 1, 3–9.
94. Zalipynis, R. A. R., (2020). BitFun: Fast answers to queries with
tunable functions in geospatial array DBMS. Proceedings of the VLDB
Endowment, 13(12), 2909–2912.
95. Zdonik, S. B., & Wegner, P., (1988). Language and methodology for
object-oriented database environments. In: Data Types and Persistence
(Vol. 1, pp. 155–171). Springer, Berlin, Heidelberg.
96. Zhang, B., Van, A. D., Wang, J., Dai, T., Jiang, S., Lao, J., & Gordon,
G. J., (2018). A demonstration of the otterTune automatic database
management system tuning service. Proceedings of the VLDB
Endowment, 11(12), 1910–1913.
97. Zlatanova, S., (2006). 3D geometries in spatial DBMS. In: Innovations
in 3D Geo Information Systems (Vol. 1, pp. 1–14). Springer, Berlin,
Heidelberg.
CHAPTER 4
THE RELATIONAL MODEL
CONTENTS
4.1. Introduction..................................................................................... 112
4.2. Brief History of the Relational Model............................................... 112
4.3. Terminology..................................................................................... 114
4.4. Integrity Constraints......................................................................... 125
4.5. Views............................................................................................... 128
References.............................................................................................. 132
112 The Creation and Management of Database Systems
4.1. INTRODUCTION
It is estimated that annual prices for new licenses for the Relational Database
Management System (RDBMS) range from $6 billion to $10 billion U.S.
dollars (or $25 billion U.S. dollars when product purchases would be
included). RDBMS becoming the preeminent data-processing technology
being used today. This piece of software is similar to the second phase of
database management systems (DBMSs), and it is built just on a relational
schema that E. F. Codd suggested (1970). The relational model organizes
all data in terms of its logical structure and places it inside relations (tables)
(Schek & Scholl, 1986). Every connection does have a name, and the data
that constitute it are organized into columns with the same name. Every row
(or tuple) has exactly one value for each property. The structural model’s
straightforward logical organization is one of its many compelling advantages.
However, underneath this seemingly straightforward architecture lies a
robust theoretical basis—something that the first iteration of DBMSs was
severely missing (the system and ranked DBMSs) (Tyler & Lind, 1992).
the late 1970s by IBM’s San José Research Facility in California, was just
one such (Astrahan et al., 1976). That project was created to demonstrate
the usefulness of the relationship paradigm by implementing its data forms
and functions. This has also proven to be an important source of knowledge
on implementation issues like transaction processing, concurrency, recovery
processes, query processing, data secure operation, human elements, and
interface design, resulting in the publishing of numerous research articles and
the provision of various prototypes. The Systems R program, in particular,
resulted in two significant developments (Biber et al., 2008):
• the creation of SQL (prominent ‘S-Q-L’ or ‘See-Quel’), an
extensible markup language (XML) that has subsequently
are becoming the official International Organization for
Standardization (ISO) and de facto standard language for
relational DBMSs;
During the late 1970s and early 1980s, many commercially relational
DBMS solutions were developed, such as IBM’s DB2 including SQL/DS,
and Oracle Company’s Oracle.
The Interactive Graphics Retrieval System (INGRES) program just at
the University of California in Berkeley, which was present simultaneously
with that of the System R effort, was indeed the second key effort in the
creation of the relational paradigm. The INGRES project included the
creation of a sample RDBMS, with both the research focusing on other
broad goals such as the Systems R project. This study created the specific
products INGRES from Relational Technology Inc. (formerly Advanced
Ingres Corporate Relational Databases from Computing Associates) as well
as the Intelligence Database Machine by Britton Lee Inc., which advanced
the broad understanding of relational ideas (Codd, 1979).
Just at IBM UK Research Institute at Peterlee, this third contribution
was the Peterlee Relational Technology Demonstrator (Todd, 1976). That
project was crucial for studies into topics such as information retrieval and
optimization, as well as functional extensions, which would have a more
theoretical bent than that of the Systems R or INGRES initiatives. In the late
1970s and early 1980s, commercial units based upon that relational paradigm
began to arise (Gardner et al., 2008). Although many don’t exactly follow
the definitions of the relational data model, there are already several hundred
RDBMSs including both industrial and PC systems. Microsoft Office and
Visible FoxPro by Microsoft, InterBase with JDataStore from Borland, plus
114 The Creation and Management of Database Systems
4.3. TERMINOLOGY
The mathematical idea of a connection, which would be physically
expressed as a table, underpins the relational paradigm. Codd, an educated
mathematician, employed mathematical terminology, primarily set theory
and deductive reasoning. The language and structural ideas of the relational
data model are discussed in this section (Getoor & Sahami, 1999).
Figure 4.1. Relationships between the branch and also the staff.
Source: https://www.researchgate.net/figure/Relationship-between-the-num-
ber-of-staff-and-network-range_fig1_266068320.
Figure 4.2. Some Branch and Staff Relations qualities have their domains.
Source: https://opentextbc.ca/dbdesign01/chapter/chapter-8-entity-relation-
ship-model/.
The Relational Model 117
Two parameters from such domains multiplied Since these two examples
demonstrate, implementing domains completely is difficult, and as a
consequence, many RDBMSs don’t support them (Horsburgh et al., 2008).
Tuple: A tuple is just a relation’s row. The row or tuples inside this
database are the components of a relation. Every row within the Branch
relationship has four variables, per characteristic. Tuples may be arranged
in any sequence, and the connection will remain the same because hence
communicate the same information. The construction of a relation, as well
as a definition of the domains or any other limits on potential values, are
referred to it by its real intention, and it is normally fixed until the definition
of the connection is updated to incorporate more characteristics. The tuples
are referred to as a relation’s extensions (or condition), that vary over time
(Vassiliadis & Sellis, 1999).
Degree: The number of qualities in a connection determines its degree.
Figure 4.1 shows a branch connection with four qualities, or grade four. This
indicates that each table row is just a four-tuple with four factors. An integer
arithmetic relation, also known as a one-tuple, is a connection with just one
variable and has a degree of one. Binary refers to a relationship with two
qualities, ternary refers to a relationship with three aspects, and n-ary refers
to a relationship with more than three components. A relation’s level is a
characteristic of the relation’s real intention (Johannesson, 1994).
Cardinality: A relation’s cardinality has been the number of tuples it
includes. The cardinality of a connection, on the other hand, refers to the
number of tuples within the relation, which varies when tuples were added
or removed. The cardinality of a connection is a feature of its extension
that is defined by the specific instance of the connection anywhere at a
given time. Finally, we’ll look at what a database system is. Database with
a relational structure A set of normalized relations, each having its relation
name. A database table is made up of properly formed relationships. This
suitability is referred to as normalization (Gougeon, 2010).
Different terminologies the structural model’s vocabulary may be
somewhat perplexing. Two sets of words have been introduced. In reality,
the third set of words is frequently used: a relation is called a file, tuples
are called records, and characteristics are called fields. This nomenclature
comes from reality so each relationship may be physically stored in a file by
the RDBMS. The parameters for the relational data model are summarized
in Table 4.1 (Pierce & Lydon, 2001).
118 The Creation and Management of Database Systems
from the first component from D1, the second component from D2, as well
as the third component from D3, seems to be the Cartesian products D1 D2
D3 of all these three sets. A connection is any collection of such a Cartesian
product. Consider the following scenario (Mereish & Poteat, 2015):
D1 = {1, 3} D2 = {2, 4} D3 = {5, 6}
D1 × D2 × D3 = {(1, 2, 5), (1, 2, 6), (1, 4, 5), (1, 4, 6), (3, 2, 5), (3, 2, 6),
(3, 4, 5), (3, 4, 6)}
A connection is any set of all these organized triples. Using n domains,
we may expand the three different sets and create a generic relation. Let D1,
D2., Dn be the number of sets. Their Cartesian output is as follows:
D1 × D2 ×... × Dn = {(d1, d2..., dn) | d1 ∈D1, d2 ∈D2..., dn ∈Dn}
and is most often written as (Gadia, 1988):
the form (d1, d2…, dn), where every other value comes from the relevant
domain. In this approach, a relationship in the relational data model may be
thought of as any subset of both the Product of two of the property domains.
A table is just a depiction of such a relationship in physical form (Aghili
Ashtiani & Menhaj, 2014).
The Branch relationship in Figure 4.1, for example, contains
characteristics branchNo, road, municipality, and postal, with its domains.
Every subset of a Product of two of the domains, or indeed any minimum of
four where the first component would be from the domains BranchNumbers,
the next from the domain StreetNames, and so on, is referred to as the
Branch relationship. The following is also one of the four tuples (Blau &
McGovern, 2003):
{(B005, 22 Deer Rd, London, SW1 4EH)} or more properly:
{(branchNo: B005, street: 22 Deer Rd, city: London, postcode: SW1
4EH)}
This is referred to as a relationship instance. The Branch table is a
handy means of putting down every one of the four tuples that make up the
connection at a given point in time, hence why tables rows in the relational
data model are referred to as tuples. A database system has a structure in
the same manner that a relationship does. Schema for database systems A
collection of related schemas, each with its unique name (Cadiou, 1976).
If R1, R2, . . . , Rn We may describe the relational data structure, or
generally relationship schema, if there exist a collection of connection
schemas., R, as: R = {R1, R2, . . . , Rn}
in fact, the ordering may affect the speed with which tuples are
accessed.)
Examine the Branch connection in Figure 4.1 once again to see what
these constraints represent. It is unlawful to keep two postal codes for just a
unique branch office inside a single cell because each cell must only hold one
value. In all other words, there are no recurring groupings in connections. A
relation is normalized if it meets this characteristic (Vyawahare et al., 2018).
The qualities of the relation are represented by the columns displayed
at the tops of the columns. We must not accept a postal value inside this
column since the values inside the branchNo property were from the
BranchNumbers domain. In a relationship, there can’t be any duplicated
tuples. The row (B005, 22 Deer Rd, London, SW1 4EH) occurs just once,
for example (Hull, 1986).
We may swap columns if the attribute term is moved including
the attributes. Even though it makes good sense to retain the address
components in the typical sequence for reading, the table could reflect the
same connection if the city property was placed even before the postcode
property. Tuples may also be swapped, therefore the records of branching
B005 and B004 can be swapped and the relationship will remain the same
(Schumacher & Fuchs, 2012).
The majority of the qualities provided for relations are derived from
mathematical equations (Lyons-Ruth et al., 2004):
• Each member in each tuple remained single-valued whenever we
computed the Cartesian combination of sets containing simple,
single-valued components like integers. In the same way, every
cell in such a relation has precisely one value. A mathematical
relationship, on the other hand, does not need to be normalized.
To keep the relational model simple, Codd decided to exclude
recurring groups.
• The set, or domains, upon which position is specified determines
the available values for that position in such a connection.
Every column in a table must have values from the very same
characteristic domain.
• There are no components in a set that are duplicated. Likewise,
there are still no duplicated tuples in a relationship.
• The position of the items in a relationship has no bearing since
it is a set. As a result, the position of tuples in a relationship is
irrelevant.
122 The Creation and Management of Database Systems
just one candidate key for the Watching relation, which consists of clientNo
and propertyNo, these characteristics would naturally constitute the primary
key (Allen & Terry, 2005).
Foreign Key: A characteristic (or combination of characteristics) in
one connection that corresponds to the primary keys of another (potentially
identical) relation (Selinger et al., 1989).
Whenever an attribute occurs in several relations, it typically indicates a
connection between the two interactions’ tuples. For example, the presence
of branchNo both in Branch and Staff relationships fields is intentional,
since it connects each branch to the specifics of the employees that work
there. BranchNo is the principal key in the Branch relation (Reilly, 2009).
The branchNo property, on the other hand, is used in the Staff relationship
to link employees to the branch office where they work. BranchNo is just
a primary key in the Staff connection. The attribute branchNo with in Staff
relation is said to be aimed towards the main key attribute Branch with
in-home relation. As we’ll see from the following chapter, such common
features play a crucial role in manipulating data (Brookshire, 1993).
Source: https://www.transtutors.com/questions/create-the-dreamhome-rental-
database-schema-defined-in-section-3–2-6-and-insert-the--2009490.htm.
The Relational Model 125
4.4.1. Nulls
Null That value contains the value for a property that is presently unknown
or irrelevant to this tuple (Calı et al., 2004).
The rational value ‘undefined’ might be interpreted as null. It might
indicate that even a value isn’t relevant to a certain tuple, and that could
simply indicate that neither value has been provided yet. Nulls are a means to
cope with missing or unusual data (Zimmermann, 1975). A null, on the other
hand, is not like a numerical value of zero or even a text string containing
spaces; although zeros and areas are values, a null denotes the lack of one.
As a result, nulls must be handled differently from those other values. Many
publications use the phrase ‘null value,’ however since a null would not be
a value, but rather the lack of one, the word is outdated (Cockcroft, 1997).
The remark attribute, for instance, may remain unspecified in the
Observing relation illustrated in Figure 4.3 until the possible renter has viewed
the home and provided his or her remark to the organization. Lacking nulls,
bogus data must be introduced to indicate this state, or extra characteristics
must be added which may or not be significant to the consumer (Graham &
Urnes, 1992). In that example, we might use the integer ‘1’ to indicate a null
remark. Additionally, we might add a new property to the Observing relation
called has Comment Stayed Supplied, which includes a Y (Yes) if a remark
has already been provided and an N (No) without. Both of these methods
might be perplexing to the consumer (Rasdorf et al., 1987).
Because the relationship model is built on that first conditional calculus,
which would be a two-valued and Boolean logic – only one values that may
be used are right or wrong – nulls might pose implementation issues. Using
nulls forces us to use higher-valued reasoning, like three- and four-valued
reasoning (Codd, 1986, 1987, 1990) (Yazıcı & Sözat, 1998).
The use of nulls within a relational paradigm is a point of contention.
Nulls were subsequently considered an important feature of the concept
by Codd (Codd, 1990). Others believe that this method is wrong, arguing
that the incomplete information issue is not completely understood, that
neither suitable solution has already been developed, but that, as a result,
nulls should not be included in any relational data model (understand, for
example, Date, 1995) (Grefen & Apers, 1993).
We’ve arrived at a point where we can specify the two relationships to
evaluate and analyze.
The Relational Model 127
4.5. VIEWS
Based on the information provided in the design of the databases as it seems
to be a specific user within a three-level ANSI-SPARC system. The term
‘view’ has a somewhat different connotation in the relational paradigm.
A viewpoint, while being the whole external representation of a user’s
perspective, is a virtualized or derived relationship: a connection which does
not exist in and of itself but may well be continuously formed from one or
even more basic relationships. As a result, an external model might include
both underlying (conceptual-level) linkages and perspectives generated
from them. Aspects of relational database systems are briefly discussed
in this section. We look at views in further depth and demonstrate how to
design and utilize them in SQL (Cosmadakis & Papadimitriou, 1984).
4.5.1. Terminology
Base relationships are the kind of relationships we’ve been discussing in
this chapter thus far. Basis A named relationship that tuples are saved in the
The Relational Model 129
A view must be built in such a way that it supports the user’s existing
external framework. Consider the following scenario (Clifford & Tansel,
1985):
• A user may need Branch tuples including the identities of
administrators and the other Branch properties. The Branch
connection is combined with a limited variant of the Employee
relationship in which the staff role is ‘Manager’ to generate this
view.
• Staff tuples lacking the pay property should be visible to certain
employees.
• Parameters can be updated or even the order in which they appear
can be modified. For instance, a user may be used to referring to
the branchNo property of branches by its complete name. That
column headline may be seen via Branch Numbers.
• Some employees should only have access to land records for such
properties they oversee.
Even though each of these situations shows that views give logical
data isolation, viewpoints provide that more substantial form of logical and
physical autonomy that aids with conceptual model restructuring. Current
customers, for instance, may be ignorant of the presence of a new attribute
introduced to a relationship if their points of view are configured to omit it.
If an established relationship is reorganized or broken up, a perspective may
be built to allow users to access their previous views (Furtado & Casanova,
1985).
REFERENCES
1. Aghili, A. A., & Menhaj, M. B., (2014). Construction and applications
of a modified fuzzy relational model. Journal of Intelligent & Fuzzy
Systems, 26(3), 1547–1555.
2. Allen, S., & Terry, E., (2005). Understanding relational modeling
terminology. Beginning Relational Data Modeling, 1, 57–87.
3. Armstrong, W. W., (1974). Dependency structures of data base
relationships. In: IFIP congress (Vol. 74, pp. 580–583).
4. Atzeni, P., Jensen, C. S., Orsi, G., Ram, S., Tanca, L., & Torlone, R.,
(2013). The relational model is dead, SQL is dead, and I don’t feel so
good myself. ACM SIGMOD Record, 42(2), 64–68.
5. Bagley, S. S., (2010). Students, teachers and alternative assessment
in secondary school: Relational models theory (RMT) in the field of
education. The Australian Educational Researcher, 37(1), 83–106.
6. Barsalou, T., Siambela, N., Keller, A. M., & Wiederhold, G., (1991).
Updating relational databases through object-based views. ACM
SIGMOD Record, 20(2), 248–257.
7. Biber, P., Hupfeld, J., & Meier, L. L., (2008). Personal values and
relational models. European Journal of Personality, 22(7), 609–628.
8. Blau, H., & McGovern, A., (2003). Categorizing unsupervised relational
learning algorithms. In: Proceedings of the Workshop on Learning
Statistical Models from Relational Data, Eighteenth International
Joint Conference on Artificial Intelligence (Vol. 1, pp. 3–9).
9. Braganholo, V. P., Davidson, S. B., & Heuser, C. A., (2003). On the
updatability of XML views over relational databases. In: WebDB (Vol.
1, pp. 31–36).
10. Brilmyer, G., (2018). Archival assemblages: Applying disability
studies’ political/relational model to archival description. Archival
Science, 18(2), 95–118.
11. Brookshire, R. G., (1993). A relational database primer. Social Science
Computer Review, 11(2), 197–213.
12. Bucciarelli, A., Ehrhard, T., & Manzonetto, G., (2009). A relational
model of a parallel and non-deterministic λ-calculus. In: International
Symposium on Logical Foundations of Computer Science (Vol. 1, pp.
107–121). Springer, Berlin, Heidelberg.
The Relational Model 133
26. Demuth, B., & Hussmann, H., (1999). Using UML/OCL constraints
for relational database design. In: International Conference on the
Unified Modeling Language (Vol. 1, pp. 598–613). Springer, Berlin,
Heidelberg.
27. Dong, G., & Su, J., (2000). Incremental maintenance of recursive views
using relational calculus/SQL. ACM SIGMOD Record, 29(1), 44–51.
28. Ehrhard, T., (2012). The Scott model of linear logic is the extensional
collapse of its relational model. Theoretical Computer Science, 424,
20–45.
29. Fan, W., & Siméon, J., (2003). Integrity constraints for XML. Journal
of Computer and System Sciences, 66(1), 254–291.
30. Fan, X., Li, B., Li, C., SIsson, S., & Chen, L., (2019). Scalable
deep generative relational model with high-order node dependence.
Advances in Neural Information Processing Systems, 1, 32.
31. Furtado, A. L., & Casanova, M. A., (1985). Updating relational views.
Query Processing in Database Systems, 127–142.
32. Gadia, S. K., (1988). A homogeneous relational model and query
languages for temporal databases. ACM Transactions on Database
Systems (TODS), 13(4), 418–448.
33. Gardner, D., Goldberg, D. H., Grafstein, B., Robert, A., & Gardner,
E. P., (2008). Terminology for neuroscience data discovery: Multi-tree
syntax and investigator-derived semantics. Neuroinformatics, 6(3),
161–174.
34. Getoor, L., & Sahami, M., (1999). Using probabilistic relational models
for collaborative filtering. In: Workshop on Web Usage Analysis and
User Profiling (WEBKDD’99) (Vol. 1, pp. 1–6).
35. Golfarelli, M., Maio, D., & Rizzi, S., (1999). Vertical fragmentation
of views in relational data warehouses. In: SEBD (Vol. 1, pp. 19–33).
36. Gougeon, N. A., (2010). Sexuality and autism: A critical review
of selected literature using a social-relational model of disability.
American Journal of Sexuality Education, 5(4), 328–361.
37. Graham, T. N., & Urnes, T., (1992). Relational views as a model for
automatic distributed implementation of multi-user applications. In:
Proceedings of the 1992 ACM Conference on Computer-Supported
Cooperative Work (Vol. 1, pp. 59–66).
38. Greenyer, J., & Kindler, E., (2010). Comparing relational model
transformation technologies: Implementing query/view/transformation
The Relational Model 135
with triple graph grammars. Software & Systems Modeling, 9(1), 21–
46.
39. Grefen, P. W., & Apers, P. M., (1993). Integrity control in relational
database systems—An overview. Data & Knowledge Engineering,
10(2), 187–223.
40. Hadzilacos, T., & Tryfona, N., (1992). A model for expressing
topological integrity constraints in geographic databases. In: Theories
and Methods of Spatio-Temporal Reasoning in Geographic Space (Vol.
1, pp. 252–268). Springer, Berlin, Heidelberg.
41. Hammer, M. M., & McLeod, D. J., (1975). Semantic integrity in a
relational data base system. In: Proceedings of the 1st International
Conference on Very Large Data Bases (Vol. 1, pp. 25–47).
42. He, J. S. K. T. G., & Naughton, C. Z. D. D. J., (2008). Relational
databases for querying XML documents: Limitations and opportunities.
In: Proceedings of VLDB (Vol. 1, pp. 302–314).
43. Hofmeyr, J. H. S., (2021). A biochemically-realizable relational model
of the self-manufacturing cell. Biosystems, 207, 104463.
44. Horsburgh, J. S., Tarboton, D. G., Maidment, D. R., & Zaslavsky, I.,
(2008). A relational model for environmental and water resources data.
Water Resources Research, 44(5), 33–38.
45. Hull, R., (1986). Relative information capacity of simple relational
database schemata. SIAM Journal on Computing, 15(3), 856–886.
46. Johannesson, P., (1994). A method for transforming relational
schemas into conceptual schemas. In: Proceedings of 1994 IEEE 10th
International Conference on Data Engineering (Vol. 1, pp. 190–201).
IEEE.
47. Kazemi, S. M., & Poole, D., (2018). Bridging weighted rules and graph
random walks for statistical relational models. Frontiers in Robotics
and AI, 5, 8.
48. Kloesgen, W., & Zytkow, J. M., (1994). Machine discovery terminology.
In: KDD Workshop (Vol. 1, p. 463).
49. Lyons-Ruth, K., Melnick, S., Bronfman, E., Sherry, S., & Llanas,
L., (2004). Hostile-helpless relational models and disorganized
attachment patterns between parents and their young children: Review
of research and implications for clinical work. Attachment Issues in
Psychopathology and Intervention, 1, 65–94.
136 The Creation and Management of Database Systems
50. Martin, J. J., (2013). Benefits and barriers to physical activity for
individuals with disabilities: A social-relational model of disability
perspective. Disability and Rehabilitation, 35(24), 2030–2037.
51. Mcminn, P., Wright, C. J., & Kapfhammer, G. M., (2015). The
effectiveness of test coverage criteria for relational database schema
integrity constraints. ACM Transactions on Software Engineering and
Methodology (TOSEM), 25(1), 1–49.
52. Mereish, E. H., & Poteat, V. P., (2015). A relational model of sexual
minority mental and physical health: The negative effects of shame on
relationships, loneliness, and health. Journal of Counseling Psychology,
62(3), 425.
53. Mesquita, L. F., Anand, J., & Brush, T. H., (2008). Comparing the
resource‐based and relational views: Knowledge transfer and spillover
in vertical alliances. Strategic Management Journal, 29(9), 913–941.
54. Motik, B., Horrocks, I., & Sattler, U., (2007). Adding integrity
constraints to OWL. In: OWLED (Vol. 258, pp. 3–9).
55. Paredaens, J., De Bra, P., Gyssens, M., & Van, G. D., (2012). The
Structure of the Relational Database Model (Vol. 17, pp. 22–27).
Springer Science & Business Media.
56. Pecherer, R. M., (1975). Efficient evaluation of expressions in a
relational algebra. In: ACM Pacific (Vol. 75, pp. 44–49).
57. Pellicano, M., Ciasullo, M. V., Troisi, O., & Casali, G. L., (2018). A
journey through possible views of relational logic. In: Social Dynamics
in a Systems Perspective (Vol. 1, pp. 195–221). Springer, Cham.
58. Pierce, T., & Lydon, J. E., (2001). Global and specific relational models
in the experience of social interactions. Journal of Personality and
Social Psychology, 80(4), 613.
59. Pirahesh, H., Mitschang, B., Südkamp, N., & Lindsay, B., (1994).
Composite-object views in relational DBMS: An implementation
perspective. Information Systems, 19(1), 69–88.
60. Pirotte, A., (1982). A precise definition of basic relational notions and
of the relational algebra. ACM SIGMOD Record, 13(1), 30–45.
61. Qian, X., (1994). Inference channel-free integrity constraints in
multilevel relational databases. In: Proceedings of 1994 IEEE
Computer Society Symposium on Research in Security and Privacy
(Vol.1, pp. 158–167). IEEE.
The Relational Model 137
62. Ramanujam, S., Gupta, A., Khan, L., Seida, S., & Thuraisingham, B.,
(2009). R2D: Extracting relational structure from RDF stores. In: 2009
IEEE/WIC/ACM International Joint Conference on Web Intelligence
and Intelligent Agent Technology (Vol. 1, pp. 361–366). IEEE.
63. Rasdorf, W. J., Ulberg, K. J., & Baugh, J. W., (1987). A structure-
based model of semantic integrity constraints for relational data bases.
Engineering with Computers, 2(1), 31–39.
64. Reilly, C., (2009). The concept of knowledge in KM: A relational
model. Electronic Journal of Knowledge Management, 7(1), 145–154.
65. Schek, H. J., & Scholl, M. H., (1986). The relational model with
relation-valued attributes. Information Systems, 11(2), 137–147.
66. Scholl, M. H., & Schek, H. J., (1990). A relational object model. In:
International Conference on Database Theory (Vol. 1, pp. 89–105).
Springer, Berlin, Heidelberg.
67. Schumacher, R. F., & Fuchs, L. S., (2012). Does understanding
relational terminology mediate effects of intervention on compare
word problems?. Journal of Experimental Child Psychology, 111(4),
607–628.
68. Selinger, P. G., Astrahan, M. M., Chamberlin, D. D., Lorie, R. A.,
& Price, T. G., (1989). Access path selection in a relational database
management system. In: Readings in Artificial Intelligence and
Databases (Vol. 1, pp. 511–522). Morgan Kaufmann.
69. Smets, M., & Jarzabkowski, P., (2013). Reconstructing institutional
complexity in practice: A relational model of institutional work and
complexity. Human Relations, 66(10), 1279–1309.
70. Smith, C. A., & Kirby, L. D., (2009). Putting appraisal in context:
Toward a relational model of appraisal and emotion. Cognition and
Emotion, 23(7), 1352–1372.
71. Sommestad, T., Ekstedt, M., & Johnson, P., (2010). A probabilistic
relational model for security risk analysis. Computers & Security,
29(6), 659–679.
72. Tansel, A. U., (2004). Temporal data modeling and integrity constraints
in relational databases. In: International Symposium on Computer
and Information Sciences (Vol. 1, pp. 459–469). Springer, Berlin,
Heidelberg.
138 The Creation and Management of Database Systems
73. Tyler, T. R., & Lind, E. A., (1992). A relational model of authority in
groups. In: Advances in Experimental Social Psychology (Vol. 25, pp.
115–191). Academic Press.
74. Vassiliadis, P., & Sellis, T., (1999). A survey of logical models for
OLAP databases. ACM SIGMOD Record, 28(4), 64–69.
75. Vermeer, M. W., & Apers, P. M., (1995). Object-oriented views of
relational databases incorporating behavior. In: DASFAA (Vol. 1, pp.
26–35).
76. Vinciquerra, K. J., (1993). Terminology Database Record
Standardization and Relational Organization in Computer-Assisted
Terminology (pp. 170–171). ASTM Special Technical Publication,
1166.
77. Vyawahare, H. R., Karde, P. P., & Thakare, V. M., (2018). A hybrid
database approach using graph and relational database. In: 2018
International Conference on Research in Intelligent and Computing in
Engineering (RICE) (Vol. 1, pp. 1–4). IEEE.
78. Yang, X., & Wang, G., (2001). Mapping referential integrity constraints
from relational databases to XML. In: International Conference on
Web-Age Information Management (Vol. 1, pp. 329–340). Springer,
Berlin, Heidelberg.
79. Yazıcı, A., & Sözat, M. İ., (1998). The integrity constraints for
similarity‐based fuzzy relational databases. International Journal of
Intelligent Systems, 13(7), 641–659.
80. Yu, K., Chu, W., Yu, S., Tresp, V., & Xu, Z., (2006). Stochastic
relational models for discriminative link prediction. Advances in
Neural Information Processing Systems, 1, 19.
81. Zimmermann, K., (1975). Different views of a data base: Coexistence
between network model and relational model. In: Proceedings of the
1st International Conference on Very Large Data Bases (Vol. 1, pp.
535–537).
CHAPTER 5
DATABASE PLANNING AND DESIGN
CONTENTS
5.1. Introduction..................................................................................... 140
5.2. The Database System Development Lifecycle................................... 141
5.3. Database Planning........................................................................... 143
5.4. Definition of the System................................................................... 144
5.5. Requirements Collection and Analysis............................................. 145
5.6. Database Design.............................................................................. 149
References.............................................................................................. 154
140 The Creation and Management of Database Systems
5.1. INTRODUCTION
Several computer-based systems increasingly rely on software rather than
hardware to succeed. Consequently, the company’s software development
track record isn’t especially spectacular. Software applications have
proliferated in recent decades, ranging from tiny, relatively basic applications
with some code lines to big, complicated programs with thousands of
lines of code. Most of such programs had to be maintained regularly (Al-
Kodmany, 1999). This included fixing any errors that were discovered,
adding additional user needs, and updating the program to function on new
or updated systems. Maintenance initiatives have been launched to deplete
resources at an astonishing rate. Consequently, a large number of important
software projects were late, over budget, unstable, hard to manage, and
underperforming (Skaar et al., 2022).
This resulted in the occurrence of the software crisis. Even though this
word had been originally coined in the late 1960s, the issue has been with
us more than four decades later. Consequently, certain authors now call
the software crisis the software slump. Research conducted in the United
Kingdom by OASIG, a Special Interest Group dealing with Organizational
Components of Information Technology, revealed the following concerning
software projects (OASIG, 1996) (Teng & Grover, 1992).
• Eighty to 90% don’t fulfill their efficiency targets;
• Approximately 80% have been delivered late and beyond budget;
• Approximately 40% of them fail or have been withdrawn;
• fewer than 40% completely address skill and training needs;
• fewer than 25% combine enterprise and technology objectives
effectively;
• Only 10 to 20% of those who apply to satisfy all of the
requirements.
There have been multiple significant reasons for the software failure of
the project, such as (El-Mehalawi & Miller, 2003):
• an absence of a comprehensive set of criteria;
• absence of a suitable development technique;
• Poor design deconstruction into manageable elements;
Database Planning and Design 141
Source: https://www.slideshare.net/AfrasiyabHaider/database-development-
life-cycle.
Database Planning and Design 143
Table 5.1. A Synopsis of the Principal Activities Connected with Each Phase
of the DSDLC
the important new user views that would be made possible by the database
(Noor et al., 2009).
Figure 5.2. User views (1, 2, and 3) as well as (5 and 6) contain overlapping
criteria (represented as hatched regions), however, user view four has diverse
demands.
Source: https://slideplayer.com/slide/5694649/.
system’s needs. This phase includes the gathering and processing of data
about the enterprise division that will be served by the database. There have
been various methods known as fact-finding methods for collecting the
required data. For every main user view (such that, enterprise application
area or job involvement), the following data has been collected (Hall &
Fagen, 2017):
• An explanation of the data that was utilized or produced;
• The specifics of how data will be utilized or produced; and
• If there are any other needs for the current database system.
After that, the data has been evaluated to determine which needs (or
characteristics) should be incorporated into the current database system.
Such criteria have been outlined in a set of documents known as the new
database system’s acceptance criteria (Arnold & Wade, 2015). The gathering
and processing of needs is a step in the database design process. The amount
of data collected has been determined by the nature of the issue and the
company’s rules. Too much research too quickly might lead to analysis
paralysis. Working on the incorrect solution to the wrong issue might result
in a loss of both money and time if you don’t give it enough attention
(Westmark, 2004).
The data gathered at this stage can be unstructured and include certain
unstructured requests that should be turned into a more organized statement
of needs. It is accomplished using requirements specification approaches
such as Data Flow Diagrams (DFD), Structured Analysis and Design
(SAD), and Hierarchical Input Process Output (HIPO) charts, all of which
are backed by documentation (Knight et al., 2003).
Determining the essential functionality of a database system is a key task,
as systems having insufficient or partial functionality would upset consumers,
resulting in system rejection or underuse. Insufficient functionality, on the
other hand, might be troublesome since it may make a system hard to create,
manage, utilize, or learn. Another essential action related to this phase is
choosing how to handle the circumstance in which the database system has
several user views. There have been 3 major techniques for addressing the
needs of a database system having numerous user views (Lantos, 1998):
• a blend of both techniques.
• the view integration technique;
• the centralized technique;
Database Planning and Design 147
combined. The view integration strategy entails treating every user view’s
needs as a distinct set of criteria. For every user view, we 1st develop a
data model in the database design step (Chen et al., 2005). A local data
model is a data model that identifies a specific user view. Every model is
comprised of documentation and diagrams that officially define the needs
of certain, though not all, database user views. The local data models are
eventually brought together to form a global data model during a later
stage of the database design process, that reflects all database user needs.
Figure 5.4 shows a schematic depicting the administration of user views 1
through 3 utilizing the view integration technique. In general, this method is
recommended (Bedogni et al., 2012).
Figure 5.4. Controlling multiple users’ views 1 to 3 utilizing the view integra-
tion technique.
While there have been considerable disparities between user perspectives
and the database system has been complicated enough to justify breaking
the task into smaller chunks. To manage various user views in certain large
Database Planning and Design 149
REFERENCES
1. Al-Kodmany, K., (1999). Using visualization techniques for enhancing
public participation in planning and design: Process, implementation,
and evaluation. Landscape and Urban Planning, 45(1), 37–45.
2. Álvarez-Romero, J. G., Mills, M., Adams, V. M., Gurney, G. G.,
Pressey, R. L., Weeks, R., & Storlie, C. J., (2018). Research advances
and gaps in marine planning: Towards a global database in systematic
conservation planning. Biological Conservation, 227, 369–382.
3. Arnold, R. D., & Wade, J. P., (2015). A definition of systems thinking:
A systems approach. Procedia Computer Science, 44, 669–678.
4. Atassi, N., Berry, J., Shui, A., Zach, N., Sherman, A., Sinani, E., &
Leitner, M., (2014). The PRO-ACT database: Design, initial analyses,
and predictive features. Neurology, 83(19), 1719–1725.
5. Bedogni, A., Fusco, V., Agrillo, A., & Campisi, G., (2012). Learning
from experience. Proposal of a refined definition and staging system
for bisphosphonate-related osteonecrosis of the jaw (BRONJ). Oral
Diseases, 18(6), 621.
6. Carroll, J. M., (1987). Strategies for extending the useful lifetime of
DES. Computers & Security, 6(4), 300–313.
7. Chen, C. H., Khoo, L. P., & Yan, W., (2005). PDCS—a product
definition and customization system for product concept development.
Expert Systems with Applications, 28(3), 591–602.
8. Chin, F. Y., & Ozsoyoglu, G., (1981). Statistical database design. ACM
Transactions on Database Systems (TODS), 6(1), 113–139.
9. Chowdary, V. M., Chandran, R. V., Neeti, N., Bothale, R. V., Srivastava,
Y. K., Ingle, P., & Singh, R., (2008). Assessment of surface and sub-
surface waterlogged areas in irrigation command areas of bihar state
using remote sensing and GIS. Agricultural Water Management, 95(7),
754–766.
10. Dey, D., Storey, V. C., & Barron, T. M., (1999). Improving database
design through the analysis of relationships. ACM Transactions on
Database Systems (TODS), 24(4), 453–486.
11. El-Mehalawi, M., & Miller, R. A., (2003). A database system of
mechanical components based on geometric and topological similarity.
Part I: Representation. Computer-Aided Design, 35(1), 83–94.
Database Planning and Design 155
12. Finkelstein, S., Schkolnick, M., & Tiberio, P., (1988). Physical database
design for relational databases. ACM Transactions on Database
Systems (TODS), 13(1), 91–128.
13. Franco‐Santos, M., Kennerley, M., Micheli, P., Martinez, V., Mason,
S., Marr, B., & Neely, A., (2007). Towards a definition of a business
performance measurement system. International Journal of Operations
& Production Management, 1, 2–9.
14. Gacek, C., Abd-Allah, A., Clark, B., & Boehm, B., (1995). On the
definition of software system architecture. In: Proceedings of the First
International Workshop on Architectures for Software Systems (Vol. 1,
pp. 85–94).
15. Hall, A. D., & Fagen, R. E., (2017). Definition of system. In: Systems
Research for Behavioral Science Systems Research (Vol. 1, pp. 81–92).
Routledge.
16. Haslum, P., Botea, A., Helmert, M., Bonet, B., & Koenig, S., (2007).
Domain-independent construction of pattern database heuristics for
cost-optimal planning. In: AAAI (Vol. 7, pp. 1007–1012).
17. Hernandez, M. J., (2013). Database Design for Mere Mortals: A
Hands-on Guide to Relational Database Design. Pearson Education.
18. Hernandez, M. J., (2013). Database Design for Mere Mortals: A
Hands-on Guide to Relational Database Design (Vol. 1, pp. 2–6).
Pearson Education.
19. Johansson, Å., Skeie, Ø. B., Sorbe, S., & Menon, C., (2017). Tax
Planning by Multinational Firms: Firm-Level Evidence from a Cross-
Country Database, 1, 2–5.
20. Junk, M., (1998). Domain of definition of Levermore’s five-moment
system. Journal of Statistical Physics, 93(5), 1143–1167.
21. Kent, A., & Williams, J. G., (1993). Encyclopedia of Microcomputers:
Multistrategy Learning to Operations Research: Microcomputer
Applications (Vol. 1, pp. 2–9). CRC Press.
22. Klochkov, Y., Klochkova, E., Antipova, O., Kiyatkina, E., Vasilieva, I.,
& Knyazkina, E., (2016). Model of database design in the conditions of
limited resources. In: 2016 5th International Conference on Reliability,
Infocom Technologies and Optimization (Trends and Future Directions)
(ICRITO) (Vol. 1, pp. 64–66). IEEE.
23. Knight, J. C., Strunk, E. A., & Sullivan, K. J., (2003). Towards a
rigorous definition of information system survivability. In: Proceedings
156 The Creation and Management of Database Systems
47. Zilio, D. C., Rao, J., Lightstone, S., Lohman, G., Storm, A., Garcia-
Arellano, C., & Fadden, S., (2004). DB2 design advisor: Integrated
automatic physical database design. In: Proceedings of the Thirtieth
International Conference on Very Large Data Bases (Vol. 1, pp. 1087–
1097).
CHAPTER 6
DATA MANIPULATION
CONTENTS
6.1. Introduction..................................................................................... 160
6.2. Introduction to SQL......................................................................... 160
6.3. Writing SQL Commands.................................................................. 165
6.4. Data Manipulation........................................................................... 167
References.............................................................................................. 173
160 The Creation and Management of Database Systems
6.1. INTRODUCTION
We provided an in-depth description of such relational models as well
as relational languages. Query Language, as well as SQL which is more
generally known, is a special language which has arisen as a result of the
evolution of the relational paradigm. In the recent past, SQL has emerged
as the dominant language for relational database management systems
(RDBMSs). The Structured Query Language (SQL) specification was first
developed in 1986 first by American National Standards Institute (ANSI),
and it has been later approved for use internationally and accepted in
1987 even by International Organization for Standardization (ISO) (ISO,
1987) (Warnes et al., 2014). SQL is presently supported by more than one
hundred Database Systems, and it can operate on a wide variety of hardware
platforms, including personal computers to mainframes. Even though SQL
is now rather important, we do not make an effort to cover all aspects of
the language because this particular standard is somewhat complicated. In
this chapter, we will concentrate on the expressions of a language that are
responsible for data modification (Chatterjee & Segev, 1991).
Source; https://www.solvexia.com/blog/5-top-tips-for-data-manipulation.
Source: https://www.javatpoint.com/dbms-sql-introduction.
genuine, and the standards organizations had acknowledged this before the
guideline was issued. Therefore, it was considered that releasing a standard
as soon as possible to create a common basis wherein the languages and
implementation might evolve was more essential than waiting until all of the
features that individuals thought should be included could be described and
agreed upon (Willis, 2003).
An ‘Integrity Improvement Feature’ was specified in an ISO supplement
released in 1989. (ISO, 1989). Around 1992, this ISO standard underwent
its first significant change, known as SQL2 and SQL-92 (ISO, 1992).
Even though some capabilities were described for the very first time in the
standards, several of them would have previously been incorporated in one
or both of the numerous SQL versions, either part or even in a comparable
manner. The following version of the standards generally referred to only
as SQL:1999, did not become official until 1999. (ISO, 1999a). Further
capabilities for entity data processing have been included in this edition. In
late 2003, a new version of SQL, SQL:2003, was released (Roof & Fergus,
2003).
Additions are vendor-provided features that go above and beyond
the standards. Using data inside a SQL Server database, for instance, that
standard that provides six alternative data types. Several implementations
add a variety of enhancements to this list. A vernacular is a term used to
describe how SQL is implemented. There are no two precisely identical
languages, and no dialect presently fits the ISO standard. Furthermore, when
database manufacturers add new features, they are extending their SQL
languages and separating them still further (Jesse, 2018).
A SQL language’s essential core, on the other hand, is exhibiting
symptoms of standardization. To claim conformity with the SQL:2003
standards, a supplier must provide a set of capabilities known as Core SQL.
Several of the remaining points are separated into bundles; for instance,
product capabilities and OLAP were separated into bundles (Operational
Logical Processing). Even though SQL was created by IBM, its prominence
prompted other companies to develop their versions. There are probably
hundreds of SQL-based solutions available nowadays, including new ones
being released regularly (El Agha et al., 2018).
6.2.4. Terminology
The phrases tables, rows, and columns are used in the ISO Software system
rather than the formal terminology relationships, properties, and tuples.
We generally utilize the ISO nomenclature in our SQL presentations. SQL
also deviates from the structural model’s specification. SQL, for instance,
enables duplicated rows within a table created by the SELECT command,
enforces column sorting, and allows users to organize the rows in a results
section (Duncan, 2018).
known as literals. For each type of data handled by SQL, there are multiple
types of regular expressions. However, we may differentiate between lambda
expressions that are encased in quotation marks and those that are not for
the sake of simplicity. Only one quotation must be used to encapsulate any
non-numeric data; single quotations are not required for integer data values.
We might utilize literally to enter data into the table, for instance (Zhang H.
& Zhang X., 2018):
INSERTINTO PropertyForRent (propertyNo, road, municipal, postcode,
kind, lodgings, payment, staffNo, ownerNo, branchNo)
VALUES (‘PA14,’ ‘16 Holhead,’ ‘Aberdeen,’ ‘AB7 5SU,’ ‘House,’ 6,
650.00, ‘CO46,’ ‘SA9,’ ‘B007’);
The amount in column rooms is just an integer literal, while the amount
in column price is just a decimal system literal; neither is contained in quote
marks. The remaining sections are all text strings contained in quote marks
(Kline et al., 2008).
Simple Queries: The SELECT declaration is used to get data through
one or maybe more MySQL database and show it. It’s a strong command that
combines the Selecting, Projector, and Join procedures of relational calculus
into a single sentence. The most often used SQL function is SELECT, which
will have the following specific form (Budiman et al., 2017):
After removing the copies, we receive the result table presented in Table
6.4.
Table 6.4. Duplicates are Removed from the Outcome Table for Example #3
2004). col4 has been printed as the fourth column of the intended values.
Usually, the term of a column confidential in the result table is named of
the equivalent column in the data frame in which it was fetched. SQL, on
the other hand, has no idea how to name the column in just this scenario.
In certain languages, the column is given a name that corresponds to its
location in the table (Gini, 2008).
(For instance, col4); others may be left the column name vacant and use
the SELECT list statement. The AS phrase is allowed by the Standard
specifications for naming the column. We might have published: in the
preceding example (Cosentino et al., 2015):
SELECT fName, lName, staffNo, salary/12 AS monthly salary
FROM Staff;
Row selection (WHERE clause)
The SELECT command is used to obtain all rows from such a table
in the examples below. Furthermore, we often have to limit the number
of rows that are returned. The WHERE clause does this by combining the
term WERE with a searching disorder that defines the rows to be fetched.
The following stand the five fundamental search criteria (or conditional
statements in ISO terminology) (Zhang et al., 2009):
• Comparison: Examine the validity of one statement in
comparison to the worth of the alternative.
• Range: Check if the value of an appearance is inside a certain
range of possibilities.
• Set Membership: Check if an expression’s factor is close to one
with a collection of values.
• Pattern Match: Check to see whether a filament fits a pattern.
• Null: Check for null (unknown) values in a column.
Data Manipulation 173
REFERENCES
1. Ali, M., (2010). An introduction to Microsoft SQL server stream insight.
In: Proceedings of the 1st International Conference and Exhibition on
Computing for Geospatial Research & Application (Vol. 1, pp. 1–1).
2. Arcuri, A., & Galeotti, J. P., (2019). SQL data generation to enhance
search-based system testing. In: Proceedings of the Genetic and
Evolutionary Computation Conference (Vol. 1, pp. 1390–1398).
3. Bagui, S., Bagui, S. S., & Earp, R., (2006). Learning SQL on SQL
server 2005 (Vol. 1, pp. 2–9). O’Reilly Media, Inc.
4. Batra, R., (2018). SQL Primer (Vol. 1, pp. 183–187). Apress, Berkeley,
CA.
5. Budiman, E., Jamil, M., Hairah, U., & Jati, H., (2017). Eloquent object
relational mapping models for biodiversity information system. In:
2017 4th International Conference on Computer Applications and
Information Processing Technology (CAIPT) (Vol. 1, pp. 1–5). IEEE.
6. Chatterjee, A., & Segev, A., (1991). Data manipulation in heterogeneous
databases. ACM SIGMOD Record, 20(4), 64–68.
7. Cosentino, V., Izquierdo, J. L. C., & Cabot, J., (2015). Gitana: A
SQL-based git repository inspector. In: International Conference on
Conceptual Modeling (Vol. 1, pp. 329–343). Springer, Cham.
8. De Haan, L., (2005). Introduction to SQL, i SQL* plus, and SQL*
plus. Mastering Oracle SQL and SQL* Plus, 1, 25–64.
9. Der, L. V., (2007). Introduction to SQL: Mastering the Relational
Database Language, 4/E (With Cd) (Vol. 1, pp. 3–9). Pearson Education
India.
10. Duncan, S., (2018). Practical SQL. Software Quality Professional,
20(4), 64–64.
11. El Agha, M. I., Jarghon, A. M., & Abu-Naser, S. S., (2018). SQL Tutor
for Novice Students (Vol. 1, pp. 4–8).
12. Emerson, S. L., Darnovsky, M., & Bowman, J., (1989). The Practical
SQL Handbook: Using Structured Query Language (Vol. 1, pp. 2–6).
Addison-Wesley Longman Publishing Co., Inc.
13. Gini, R., (2008). Stata tip 56: Writing parameterized text files. Stata
Journal, 8(199-2016-2514), 134–136.
14. Gorman, T., (2014). Introduction to SQL and SQL developer. In:
Beginning Oracle SQL (Vol. 1, pp. 23–58). A press, Berkeley, CA.
174 The Creation and Management of Database Systems
15. Haan, L. D., Fink, D., Gorman, T., Jørgensen, I., & Morton, K., (2009).
Introduction to SQL, SQL* plus, and SQL developer. In: Beginning
Oracle SQL (Vol. 1, pp. 25–69). Apress.
16. Haan, L. D., Fink, D., Gorman, T., Jørgensen, I., & Morton, K., (2009).
Writing and automating SQL* plus scripts. In: Beginning Oracle SQL
(Vol. 1, pp. 287–327). Apress.
17. Harkins, S. S., & Reid, M. W., (2002). Introduction to SQL server. In:
SQL: Access to SQL Server (Vol. 1, pp. 307–370). Apress, Berkeley,
CA.
18. Jesse, G., (2018). SQL: An introduction to SQL lesson and hands-on
lab. In: Proceedings of the EDSIG Conference ISSN (Vol. 2473, p.
3857).
19. Julavanich, T., Nalintippayawong, S., & Atchariyachanvanich, K.,
(2019). RSQLG: The reverse SQL question generation algorithm. In:
2019 IEEE 6th International Conference on Industrial Engineering and
Applications (ICIEA) (Vol. 1, pp. 908–912). IEEE.
20. Kearns, R., Shead, S., & Fekete, A., (1997). A teaching system for
SQL. In: Proceedings of the 2nd Australasian Conference on Computer
Science Education (Vol. 1, pp. 224–231).
21. Kemalis, K., & Tzouramanis, T., (2008). SQL-IDS: A specification-
based approach for SQL-injection detection. In: Proceedings of the
2008 ACM Symposium on Applied Computing (Vol. 1, pp. 2153–2158).
22. Kim, W., (1992). Introduction to SQL/X. In: Future Databases’ 92
(Vol. 1, pp. 2–7).
23. Kline, K., Kline, D., & Hunt, B., (2008). SQL in a Nutshell: A Desktop
Quick Reference Guide (Vol. 1, pp. 1–4). O’Reilly Media, Inc.
24. Kofler, M., (2005). An introduction to SQL. The Definitive Guide to
MySQL5 (2nd edn., pp. 189–216).
25. Kriegel, A., (2011). Discovering SQL: A Hands-on Guide for Beginners
(Vol. 1, pp. 5–7). John Wiley & Sons.
26. Kumar, R., Gupta, N., Charu, S., Bansal, S., & Yadav, K., (2014).
Comparison of SQL with HiveQL. International Journal for Research
in Technological Studies, 1(9), 2348–1439.
27. Lans, R. F. V. D., (2006). Introduction to SQL: Mastering the Relational
Database Language (Vol. 1, pp. 2–5). Addison-Wesley Professional.
Data Manipulation 175
28. Leng, C., & Terpstra, W. W., (2010). Distributed SQL queries with
bubblestorm. In: From Active Data Management to Event-Based
Systems and More (Vol. 1, pp. 230–241). Springer, Berlin, Heidelberg.
29. Ma, L., Zhao, D., Gao, Y., & Zhao, C., (2019). Research on SQL
injection attack and prevention technology based on web. In: 2019
International Conference on Computer Network, Electronic and
Automation (ICCNEA) (Vol. 1, pp. 176–179). IEEE.
30. Melton, J., & Simon, A. R., (2001). SQL: 1999: Understanding
Relational Language Components (Vol. 1, pp.6–9). Elsevier.
31. Morton, K., Osborne, K., Sands, R., Shamsudeen, R., & Still, J., (2010).
Core SQL. In: Pro Oracle SQL (Vol. 1, pp. 1–27). Apress.
32. Naeem, M. A., Ullah, S., & Bajwa, I. S., (2012). Interacting with data
warehouse by using a natural language interface. In: International
Conference on Application of Natural Language to Information
Systems (Vol. 1, pp. 372–377). Springer, Berlin, Heidelberg.
33. Ntagwabira, L., & Kang, S. L., (2010). Use of query tokenization to
detect and prevent SQL injection attacks. In: 2010 3rd International
Conference on Computer Science and Information Technology (Vol. 2,
pp. 438–440). IEEE.
34. Otair, M., Al-Sardi, R., & Al-Gialain, S., (2008). An Arabic retrieval
system with native language rather than SQL queries. In: 2008 First
International Conference on the Applications of Digital Information
and Web Technologies (ICADIWT) (Vol. 1, pp. 84–89). IEEE.
35. Phewkum, C., Kaewchaiya, J., Kobayashi, K., & Atchariyachanvanich,
K., (2019). Scramble SQL: A novel drag-and-drop SQL learning
tool. In: 2019 23rd International Computer Science and Engineering
Conference (ICSEC) (Vol. 1, pp. 340–344). IEEE.
36. Piyayodilokchai, H., Panjaburee, P., Laosinchai, P., Ketpichainarong,
W., & Ruenwongsa, P., (2013). A 5E learning cycle approach–based,
multimedia-supplemented instructional unit for structured query
language. Journal of Educational Technology & Society, 16(4), 146–
159.
37. Piyayodilokchai, H., Ruenwongsa, P., Ketpichainarong, W., Laosinchai,
P., & Panjaburee, P., (2011). Promoting students’ understanding of
SQL in a database management course: A learning cycle approach.
International Journal of Learning, 17(11), 2–6.
176 The Creation and Management of Database Systems
38. Rankins, R., Bertucci, P., Gallelli, C., & Silverstein, A. T., (2010).
Microsoft SQL Server 2008 R2 Unleashed (Vol. 1, pp. 2–9). Pearson
Education.
39. Renaud, K., & Biljon, J. V., (2004). Teaching SQL—Which pedagogical
horse for this course?. In: British National Conference on Databases
(Vol. 1, pp. 244–256). Springer, Berlin, Heidelberg.
40. Roof, L., & Fergus, D., (2003). Introduction to SQL Server CE. In:
The Definitive Guide to the. NET Compact Framework (Vol. 1, pp.
453–481). Apress, Berkeley, CA.
41. Rose, J. A., (1989). Introduction to SQL, by Rick F. Van Der Lans,
Addison-Wesley Publishing Company, Wokingham, England,
348pages including index, 1988 (£ 16.95). Robotica, 7(4), 365–366.
42. Sadiq, S., Orlowska, M., Sadiq, W., & Lin, J., (2004). SQLator: An
online SQL learning workbench. In: Proceedings of the 9th Annual
SIGCSE Conference on Innovation and Technology in Computer
Science Education (Vol. 1, pp. 223–227).
43. Saisanguansat, D., & Jeatrakul, P., (2016). Optimization techniques for
PL/SQL. In: 2016 14th International Conference on ICT and Knowledge
Engineering (ICT&KE) (Vol. 1, pp. 44–48). IEEE.
44. Sarhan, A. A., Farhan, S. A., & Al-Harby, F. M., (2017). Understanding
and discovering SQL injection vulnerabilities. In: International
Conference on Applied Human Factors and Ergonomics (Vol. 1, pp.
45–51). Springer, Cham.
45. Thomas J. Watson IBM Research Center. Research Division, & Denny,
G. H., (1977). An introduction to SQL, a Structured Query Language,
(Vol. 1, pp.4–9).
46. Warnes, G. R., Bolker, B., Gorjanc, G., Grothendieck, G., Korosec, A.,
Lumley, T., & Rogers, J., (2014). gdata: Various R programming tools
for data manipulation. R Package Version, 2(3), 35.
47. Willis, T., (2003). Introduction to SQL Server 2000. In: Beginning SQL
Server 2000 for Visual Basic Developers (Vol. 1, pp. 11–28). Apress,
Berkeley, CA.
48. Zhang, H., & Zhang, X., (2018). SQL injection attack principles
and preventive techniques for PHP site. In: Proceedings of the 2nd
International Conference on Computer Science and Application
Engineering (Vol. 1, pp. 1–9).
Data Manipulation 177
49. Zhang, Y., Xiao, Y., Wang, Z., Ji, X., Huang, Y., & Wang, S., (2009).
ScaMMDB: Facing challenge of mass data processing with MMDB.
In: Advances in Web and Network Technologies, and Information
Management (Vol. 1, pp. 1–12). Springer, Berlin, Heidelberg.
CHAPTER 7
DATABASE CONNECTIVITY AND WEB
TECHNOLOGIES
CONTENTS
7.1. Introduction..................................................................................... 180
7.2. Database Connectivity..................................................................... 180
7.3. Internet Databases........................................................................... 194
7.4. Extensible Markup Language........................................................... 204
References.............................................................................................. 208
180 The Creation and Management of Database Systems
7.1. INTRODUCTION
A database, as already known, is a central place for crucial corporate data.
Conventional commercial applications or emerging business channels like
the Internet and mobile devices such as smart phones might create this
data (Wahle et al., 2009). The data should be accessible to all commercial.
These users require data access through a variety of methods, including
spreadsheets, Visual Basic applications, Web front ends, Microsoft Access
reports and forms, and etc. The topologies that programs employ to link to
databases are discussed in this chapter (Coelho et al., 2011).
The Internet has altered the way businesses of all sizes function.
Purchasing products and services over the Web, for instance, has become
normal. Interconnectivity occurs in current’s environment not only among
an application and the database, but also among applications exchanging
messages and data (Baca et al., 2009). The Extensible Markup Language
(XML) standardizes the exchange of structured and unstructured data
amongst programs. Because the Web and databases are becoming more
intertwined, database experts must understand how to design, use, and
maintain Web interfaces to the databases (Migliore & Chinta, 2017).
Source:https://docs.oracle.com/en/database/oracle/oracle-database/119/db-
seg/introduction-to-strong-authentication.html.
A good API simplifies software development by giving all the necessary
building parts; the computer programmer assembles the blocks. Most operating
systems, like Microsoft Windows, offer an API so that the developers can create
programs that are compatible with the operating system. Even though APIs
are developed for programmers, they eventually benefit consumers since they
ensure that all apps utilizing a common API have identical user interfaces. This
facilitates user learning of new programs (Stephan et al., 2001). The ODBC
database middleware protocol was the first extensively used standard, and it
was quickly implemented in Windows applications. Beyond the capacity to
implement SQL and modify relational style data, ODBC didn’t give considerable
capability as computer languages matured. As a result, programmers required a
more efficient method of data access. Microsoft created two more data access
APIs to meet this need (Norrie et al., 1998):
• Data Access Objects is an API based on object that allows Visual
Basic programs to retrieve MS Access, dBase, and MS FoxPro
Database Connectivity and Web Technologies 183
Source: https://www.oreilly.com/library/view/ado-activex-data/155659241150/
ch01s01.html.
184 The Creation and Management of Database Systems
The fundamental ODBC design has three key modules (Kuan et al.,
2015):
• An API of ODBC that application programs can use to access
ODBC features.
• A driver manager that is responsible of handling all connections
of database.
• ODBC driver that interconnects straight to the DBMS.
The 1st phase in utilizing ODBC is to define the source of data. To
define the source of data, one should first construct data source name (DSN)
(Jansons & Cook, 2006).
To develop the DSN one must provide the following:
• ODBC Driver: One must determine which driver will be used to
link to the source of data. Typically, the database manufacturer
supplies the ODBC driver, even though Microsoft offers many
drivers that link to the majority of popular databases. If the Oracle
DBMS is used, for instance, one will choose the Oracle-supplied
ODBC driver for Oracle or, if needed, the Microsoft-supplied
ODBC driver for Oracle.
• DSN Name: This is the name by which ODBC, and hence
applications, will recognize the source of data. There are 2 sorts
of data sources available in ODBC: user and system. Only the
user has access to user data sources. All of the users, particularly
operating system services, have access to system sources of data
(Lamb, 2007).
• ODBC Driver Parameters: To link to the database, most of the
ODBC drivers need specified parameters. If the database of MS
Access, for instance, one should specify the position of the file of
Microsoft Access and, if essential, a login and password. If the
DBMS server is used, one will require to enter the name of server
and database, login, and password to link to the database. The
ODBC displays necessary to develop a System ODBC source of
data for the Oracle DBMS are shown in Figure 7.3. It should be
noted that some of the ODBC drivers rely on the native driver
given by the DBMS seller.
Database Connectivity and Web Technologies 185
Source: tackoverflow.com/questions/511026065/how-do-i-setup-an-odbc-con-
nection-to-oracle-using-firedac.
Once the ODBC source of data has been created, application developers
can easily write to ODBC API by executing particular commands with
the necessary arguments. The ODBC driver manager will direct calls to
the suitable source of data. The ODBC API standard specifies 3 degrees
of conformance: Core, Level 1, and Level 2, which offer progressively
greater capability. Level-1 may support the majority of SQL DML and
DDL statements, such as sub-queries and aggregate operations, however
procedural SQL and cursors aren’t supported. Database suppliers can pick
which support level to implement. To interface with ODBC, however,
the database seller should execute all of the functionality outlined in the
corresponding ODBC API level of support (Stephens & Huhns, 1999).
Figure 7.4 explains how to utilize ODBC to access data from Oracle
RDBMS using Microsoft Excel. The usage of these interfaces was restricted
when they were utilized with other kinds of data source since most of the
features provided by them are targeted at accessing relational sources of
data. Access to alternative non-relational sources of data has grown more
relevant with the introduction of object-oriented programming languages
(Huang et al., 2015).
186 The Creation and Management of Database Systems
Source: https://stackoverflow.com/questions/488196768/connecting-to-oracle-
database-through-excel.
7.2.3. OLE-DB
ODBC, RDO, and DAO were extensively utilized, however they didn’t s
nonrelational data. Microsoft created Object Linking and Embedding for
Databases to address this need and ease data communication (OLE-DB).
OLE-DB is the middleware database that offers object-oriented capability
for accessibility to non-relational and relational data. It is centered on
Microsoft’s Component Object Model (COM). OLE-DB was the initial
component of Microsoft’s ambition to offer an uniform object-oriented
foundation for next-generation application advancement (Moffatt, 1996).
OLE-DB is built of COM objects that offer programs with relatively
low database connectivity. Due to the fact that OLE-DB is built on COM,
the objects have data and techniques, also called the interface. The OLE-DB
paradigm is easier to comprehend when its functionality is divided into 2
sorts of objects (Saxena & Kumar, 2012):
Database Connectivity and Web Technologies 187
OLE-DB added features to the apps that accessed the data. Moreover,
it lacked assistance for scripting languages, particularly those employed in
Web development, like Active Server Pages (ASPs) and ActiveX. (A script
is created in an interpretable programming language that is implemented at
runtime) (Vecchio et al., 2020). ActiveX Data Objects (ADO) offers a high-
level, interface based on application to communicate with OLE-DB, RDO,
and DAO. Microsoft built this architecture to provide this capability. ADO
provides a standardized interface for computer languages that use OLE-
DB objects to retrieve data. Figure 7.5 depicts the ADO/OLE-DB design’s
interaction with native and ODBC connectivity alternatives. ADO presented
a simplified object model consisting of a handful of communicating objects
to deliver the data transformation services needed by applications. Table 7.2
contains examples of ADO object types (Song & Gao, 2012).
Source: http://www.differencebetween.net/technology/web-applications/differ-
ence-between-oledb-and-odbc/.
Even though the ADO paradigm is a vast advance over the OLE-DB
paradigm, Microsoft is urging programmers to utilize ADO.NET, their
newest data access architecture (Lee et al., 2016).
7.2.4. ADO.NET
ADO.NET, which is centered on ADO, is the data access module of
Microsoft’s.NET application development platform. The Microsoft.
NET architecture is the component-oriented platform for creating global,
heterogeneous, inter-operable applications that can manipulate any sort of
data across any network and in either programming language. The aim of this
book extends beyond comprehensive examination of the .NET architecture
(Khannedy, 2011).
Consequently, this part will solely introduce ADO.NET, the fundamental
data access module of the .NET architecture. It is essential to realize that the
190 The Creation and Management of Database Systems
Source: https://www.codeproject.com/Articles/338643/ASP-NET-Providers-
for-the-ADO-NET-Entity-Framework.
Database Connectivity and Web Technologies 191
Source: https://www.tutorialspoint.com/jdbc/jdbc-introduction.htm.
Every day, more organizations invest money in building and extending
their Web presence, as well as finding new ways to do business online. This
type of business will produce a growing quantity of information, which
will be kept in databases. Java and the.NET architecture are examples of
how businesses are increasingly relying on the Web as a crucial business
resource. In reality, the Internet is expected to become the next development
platform. The sections below will teach more about Web databases and how
to use them (Chen et al., 2000).
It is simple to see why various database experts believe the DBMS link
to the Internet to be the vital aspect in IS development in today’s business
and worldwide information environment. The Web has a substantial
impact on database application development, particularly the development
and administration of user interfaces and the connectivity of database, as
described in the next sections. Having a Web-oriented database interface, on
the other hand, doesn’t invalidate the database development and execution
challenges. In the end, whether you buy anything online or in person, the
196 The Creation and Management of Database Systems
delivers it to the client’s browser for display. This extension enables retrieval
and presentation of query outcomes, but more importantly, it ensures that
(Xu, 2012). It offers its services to Web server in a completely transparent
manner to the client browser.
In summary, the server-side extension significantly enhances the
capability of the server of Web and, by extension, the Internet (Minkiewicz
et al., 2015). Web to database middleware is another term for the database
server-side extension software. The communication amongst the browser,
Web server, and the Web to database middleware is depicted in Figure 7.8.
Figure 7.8 shows the Web to database middleware activities (Khan et
al., 2001):
• A page request is sent to Web server by the browser of client.
• The request is received and validated by the Web server. The server
will then forward the query to Web to database middleware to be
processed. In most cases, the queried page includes a scripting
language that enables database communication.
Source: https://flylib.com/books/en/2.6772.1.65/1/.
198 The Creation and Management of Database Systems
language, most commonly Perl, Visual Basic, or C#. Using the parameters
given by the Web server, the information of the script file can be utilized to
link to the database and get data from it. Following that, the script changes
the extracted data to HTML style and transmits it to Internet server, which
delivers the HTML-styled page to the client (Meng et al., 1998).
The primary drawback of utilizing CGI scripts would be this document
is just an external application that is performed independently for every user
query. This situation reduces system efficiency. For instance, if there are 200
continuous requests, the script will be loaded 2 hundred times, consuming
substantial CPU and memory on the Web server. The script’s language and
creation process can also effect system performance. Using an interpretive
language or constructing the script incompetently, for instance, can reduce
performance (Mohr et al., 1998).
A novel Web server interface standard called API is more effective and
quicker as compared to the CGI script. Because APIs are executed as shared
code or dynamic-link frameworks, they are more effective (DLLs). That is,
the API is considered as if it were a component of a Web server program,
which is called dynamically as required (Van Dulken 1999).
APIs are quicker as compared to CGI scripts as the code is stored in
memory, eliminating the need to run a separate program for every request.
Rather, all requests are served by the same API. One more benefit is that
the API can utilize the mutual connection to database rather than building
a novel one each time, as done by CGI scripts. Even though APIs handle
requests more efficiently, they have significant drawbacks. Since the APIs
and the Web server use the similar memory space, an API issue can bring
this server down. Another issue is that APIs are unique to Internet server and
the operating system. At the time of writing, there are 4 well-known Web
server APIs (de Macedo et al., 2008):
• ISAPI (Internet Server API) for Web servers of Microsoft
Windows.
• WSAPI (WebSite API) for O’Reilly Web servers.
• JDBC to offer database connectivity for applications of Java.
The several kinds of Web interfaces are demonstrated in Figure 7.9
(Lemkin et al., 2005).
200 The Creation and Management of Database Systems
Source: https://frankfu.click/database/database-system-design-management/
chapter-15-database-and-internet/.
Web to the database middleware program should be capable to link to
the database irrespective of the kind of Web server interface utilized. One of
2 methods can be used to make that connection (Ou & Zhang, 2006):
• Make use of the vendor’s native SQL access middleware. If
you’re using Oracle, you can, for instance, use SQL*Net.
• Use Open Database Connectivity (ODBC), OLE-DB (Object
Linking and Embedding for Database), ActiveX Data Objects
(ADO), ADO.NET (ActiveX Data Objects for .NET) interface,
or Java Database Connectivity (JDBC) for Java.
(Mai et al., 2014). The task of the Internet browser is to read the HTML
code received from the Web server and display the several page modules
in the standard standardized manner. Consequently, the browser’s ability to
analyze and present information is insufficient for developing Web-oriented
apps. This is due to the fact that the Internet is indeed a stateless system,
which means that the Web server doesn’t check the update of any client
connecting with it at any time (Bradley, 2003). Such that, there isn’t any
open communication line amongst the server and every client who connects
to it, which is obviously impracticable on the Internet! Rather, client, and
computers of server communicate in brief “conversations” based on the
request-response concept. Because the browser is only involved with the
existing page, the second page has no means of knowing what was carried
out on the first. The only time the server computers and client connect is
when the client asks a page and the server transmits the desired page to a
client after the user clicks on a link (Falk, 2005).
The server/client communication is terminated after the page and its
modules are received by the client. As a result, while one might be surfing
a page and believe that interaction is open, one is actually merely accessing
the HTML document saved in browser’s local cache (temporary directory).
The server has no notion what the consumer is doing with the page, what
information is inserted in the form, which option is chosen, and so on. To
respond to the client’s choices on Web, one must navigate to the novel page,
losing sight of what was done previously (Kiley, 1997)!
The role of a Internet browser is to present the page on the computer
of client. By utilizing HTML, the browser has no computing capabilities
besides styling output script and receiving form field inputs. Even while the
browser validates form field data, rapid data entry validation isn’t possible.
Web deviates to some other Web programming languages like Java,
VBScript, and JavaScript to conduct such important client-side processing
(Chen et al., 1996).
The browser looks like a dumb terminal that can only present data and
conduct simple processing like receiving form data inputs. Plug-ins as well
as other client-side extensions are required to enhance the functionality of
the Web browser. Web application servers offer the essential computing
power on the side of server (Bouguettaya et al., 1998).
202 The Creation and Management of Database Systems
retrieved from the Web server, allow to process the data within the browser.
ActiveX controls can generally be written in a variety of programming
languages, the most popular of which are C++ and Visual Basic. The .NET
framework from Microsoft permits ActiveX-oriented applications (like
ADO.NET) to work across various operating systems (Braxton et al., 2003).
One more Microsoft tool used to enhance browser capabilities is
VBScript. Microsoft Visual Basic is the source of VBScript. VBScript code,
such as JavaScript, is embedded into an HTML page and is launched by
triggering events like clicking a link. From the developer’s perspective,
utilizing routines that allow validation of data on the side of client is a must
(Dubey & Chueh, 1998). When data is inserted on a Web form, for instance,
and no data analysis is performed on the side of client, the complete data set
should be submitted to the Web server. In that case, the server must complete
all data analysis, wasting significant CPU cycles of processing. As a result,
among the most fundamental elements for Web applications is the client-
side data input va. The vast majority of data validation functions are written
in Java, JavaScript, VBScript, or Active X (Liu et al., 1998).
ProductId>2345-AA</ProductId>.
• The nesting of XMLs should be done correctly. A correctly layered
XML would look something like this: Product>ProductId>2345-
AA</ProductId></Product>.
• The <-- & --> symbols can be used to add comments to an XML
document.
• Only XMLs are allowed to use the XML and xml prefixes.
XML isn’t a novel version of HTML or a substitute for it. XML is
engaged with the definition and processing of information instead of data
the presentation of data. XML offers the principles that allow structured
documents to be shared, exchanged, and manipulated across organizational
boundaries (Yoshida et al., 2005). XML and HTML serve complementing
services instead of overlapping ones. XHTML Extensible Hypertext Markup
Language) is HTML’s next generation, built on the XML architecture. The
XHTML standard adds XML functionality to the HTML standard. Even
though more sophisticated than HTML, XHTML has relatively severe
syntactic constraints (Vuong et al., 2001).
Assume a B2B scenario in which Company A utilizes XML to swap item
data with Company B over through the Web as an instance of how XML
may be used for data sharing. The details of ProductList.xml document are
shown in Figure 7.10 (Baski & Misra, 2011).
Source: https://www.slideshare.net/SaranyaPsg/1-xml-fundamen-
tals-1972357783.
Database Connectivity and Web Technologies 207
REFERENCES
1. Abdalhakim, H., (2009). Addressing burdens of open database
connectivity standards on the users. In: 2009 Third International
Symposium on Intelligent Information Technology Application
Workshops (Vol. 1, pp. 305–308). IEEE.
2. Baber, J. C., & Hodgkin, E. E., (1992). Automatic assignment of
chemical connectivity to organic molecules in the Cambridge structural
database. Journal of Chemical Information and Computer Sciences,
32(5), 401–406.
3. Baca, A., Dabnichki, P., Heller, M., & Kornfeind, P., (2009). Ubiquitous
computing in sports: A review and analysis. Journal of Sports Sciences,
27(12), 1335–1346.
4. Baski, D., & Misra, S., (2011). Metrics suite for maintainability of
extensible markup language web services. IET Software, 5(3), 320–
341.
5. Bazghandi, A., (2006). Web database connectivity methods (using
MySQL) in windows platform. In: 2006 2nd International Conference
on Information & Communication Technologies (Vol. 2, pp. 3577–
3581). IEEE.
6. Berman, J. J., (2005). Pathology data integration with eXtensible
markup language. Human Pathology, 36(2), 139–145.
7. Bl Bard, J., & Davies, J. A., (1995). Development, databases and the
internet. BioEssays, 17(11), 999–1001.
8. Blinowska, K. J., & Durka, P. J., (2005). Efficient application of
internet databases for new signal processing methods. Clinical EEG
and Neuroscience, 36(2), 123–130.
9. Bouguettaya, A., Benatallah, B., & Edmond, D., (1998). Reflective
data sharing in managing internet databases. In: Proceedings 18th
International Conference on Distributed Computing Systems (Cat. No.
98CB36183) (Vol. 1, pp. 172–181). IEEE.
10. Bouguettaya, A., Benatallah, B., Ouzzani, M., & Hendra, L., (1999).
Using java and CORBA for implementing internet databases. In:
Proceedings 15th International Conference on Data Engineering (Cat.
No. 99CB36337) (Vol. 1, pp. 218–227). IEEE.
11. Bradley, G., (2003). Introduction to extensible markup language
(XML) with operations research examples. Newletter of the INFORMS
Computing Society, 24(1), 1–20.
Database Connectivity and Web Technologies 209
12. Braxton, S. M., Onstad, D. W., Dockter, D. E., Giordano, R., Larsson,
R., & Humber, R. A., (2003). Description and analysis of two internet-
based databases of insect pathogens: EDWIP and VIDIL. Journal of
Invertebrate Pathology, 83(3), 185–195.
13. Bray, T., Paoli, J., Sperberg-McQueen, C. M., Maler, E., Yergeau, F., &
Cowan, J., (2000). Extensible Markup Language (XML), 1, 3–7.
14. Brown, J. A., Rudie, J. D., Bandrowski, A., Van, H. J. D., & Bookheimer,
S. Y., (2012). The UCLA multimodal connectivity database: A web-
based platform for brain connectivity matrix sharing and analysis.
Frontiers in Neuroinformatics, 6, 28.
15. Bryan, M., (1998). An introduction to the extensible markup language
(XML). Bulletin of the American Society for Information Science,
25(1), 11–14.
16. Carmichael, P., (2002). Extensible markup language and qualitative data
analysis. In: Forum Qualitative Sozialforschung/Forum: Qualitative
Social Research (Vol. 3, No. 2).
17. Castan, G., Good, M., & Roland, P., (2001). Extensible markup
language (XML) for music applications: An introduction. The Virtual
Score, 12, 95–102.
18. Chen, H., Schuffels, C., & Orwig, R., (1996). Internet categorization and
search: A self-organizing approach. Journal of Visual Communication
and Image Representation, 7(1), 88–102.
19. Chen, J., DeWitt, D. J., Tian, F., & Wang, Y., (2000). NiagaraCQ:
A scalable continuous query system for internet databases. In:
Proceedings of the 2000 ACM SIGMOD International Conference on
Management of Data (Vol. 1, pp. 379–390).
20. Coelho, P., Aguiar, A., & Lopes, J. C., (2011). OLBS: Offline location
based services. In: 2011 Fifth International Conference on Next
Generation Mobile Applications, Services and Technologies (Vol. 1,
pp. 70–75). IEEE.
21. Coetzee, M., & Eloff, J., (2002). Secure database connectivity on the
www. In: Security in the Information Society (Vol. 1, pp. 275–286).
Springer, Boston, MA.
22. De Leeuw, N., Dijkhuizen, T., Hehir‐Kwa, J. Y., Carter, N. P., Feuk, L.,
Firth, H. V., & Hastings, R., (2012). Diagnostic interpretation of array
data using public databases and internet sources. Human Mutation,
33(6), 930–940.
210 The Creation and Management of Database Systems
23. De Macedo, D. D., Perantunes, H. W., Maia, L. F., Comunello, E., Von,
W. A., & Dantas, M. A., (2008). An interoperability approach based
on asynchronous replication among distributed internet databases. In:
2008 IEEE Symposium on Computers and Communications (Vol. 1,
pp. 658–663). IEEE.
24. Deng, Y., Tanga, Z., & Yunhua, C. M. C., (2010). Information integration
based on open geospatial database connectivity specification. In:
ISPRS Technical Commission IV, ASPRS/CaGIS 2010 Fall Specialty
Conference (Vol. 1, pp. 4–8).
25. Di Martino, S., Fiadone, L., Peron, A., Riccabone, A., & Vitale, V. N.,
(2019). Industrial internet of things: Persistence for time series with
NoSQL databases. In: 2019 IEEE 28th International Conference on
Enabling Technologies: Infrastructure for Collaborative Enterprises
(WETICE) (Vol. 1, pp. 340–345). IEEE.
26. Dubey, A. K., & Chueh, H., (1998). Using the extensible markup
language (XML) in automated clinical practice guidelines. In:
Proceedings of the AMIA Symposium (Vol. 1, p. 735). American
Medical Informatics Association.
27. Etzioni, O., & Weld, D. S., (1995). Intelligent agents on the internet:
Fact, fiction, and forecast. IEEE Expert, 10(4), 44–49.
28. Falk, H., (2005). State library databases on the internet. The Electronic
Library, 23(4), 492–498.
29. Fatima, H., & Wasnik, K., (2016). Comparison of SQL, NoSQL and
NewSQL databases for internet of things. In: 2016 IEEE Bombay
Section Symposium (IBSS) (Vol. 1, pp. 1–6). IEEE.
30. Friedman, C., Hripcsak, G., Shagina, L., & Liu, H., (1999). Representing
information in patient reports using natural language processing and
the extensible markup language. Journal of the American Medical
Informatics Association, 6(1), 76–87.
31. Gordon, A., (2003). Terrorism and knowledge growth: A databases
and internet analysis. In: Research on Terrorism (Vol. 1, pp. 124–138).
Routledge.
32. Hackathorn, R. D., (1993). Enterprise Database Connectivity: The Key
to Enterprise Applications on the Desktop (Vol. 1, pp. 4–8). John Wiley
& Sons, Inc.
33. Hall, L. H., & Kier, L. B., (2000). Molecular connectivity chi indices
for database analysis and structure-property modeling. In: Topological
Database Connectivity and Web Technologies 211
Indices and Related Descriptors in QSAR and QSPAR (Vol. 1, pp. 317–
370). CRC Press.
34. Harris, P., & Reiner, D. S., (1990). The lotus DataLens approach to
heterogeneous database connectivity. IEEE Data Eng. Bull., 13(2),
46–51.
35. Hodge, M. R., Horton, W., Brown, T., Herrick, R., Olsen, T., Hileman,
M. E., & Marcus, D. S., (2016). Connectome DB—sharing human
brain connectivity data. Neuroimage, 124, 1102–1107.
36. Huang, H., Nguyen, T., Ibrahim, S., Shantharam, S., Yue, Z., & Chen, J.
Y., (2015). DMAP: A connectivity map database to enable identification
of novel drug repositioning candidates. In: BMC Bioinformatics (Vol.
16, No. 13, pp. 1–11). BioMed Central.
37. Huang, H., Wu, X., Pandey, R., Li, J., Zhao, G., Ibrahim, S., & Chen,
J. Y., (2012). C2Maps: A network pharmacology database with
comprehensive disease-gene-drug connectivity relationships. BMC
Genomics, 13(6), 1–14.
38. Huh, S., (2014). Coding practice of the journal article tag suite
extensible markup language. Sci. Ed., 1(2), 105–112.
39. Ivanov, S., & Carson, J. H., (2002). Database connectivity. In: New
Perspectives on Information Systems Development (Vol. 1, pp. 449–
460). Springer, Boston, MA.
40. Jacobsen, H. E., & Andenæs, R., (2011). Third year nursing students’
understanding of how to find and evaluate information from
bibliographic databases and internet sites. Nurse Education Today,
31(8), 898–903.
41. Jansons, S., & Cook, G. J., (2006). Web-enabled database connectivity:
A comparison of programming, scripting, and application-based access.
Information Systems Management, 1, 4–6.
42. Johnson, R. A., (2014). Java database connectivity using SQLite:
A tutorial. International Journal of Information, Business and
Management, 6(3), 207.
43. Katehakis, D. G., Sfakianakis, S., Tsiknakis, M., & Orphanoudakis,
S. C., (2001). An infrastructure for integrated electronic health record
services: The role of XML (extensible markup language). Journal of
Medical Internet Research, 3(1), e826.
212 The Creation and Management of Database Systems
44. Kerse, N., Arroll, B., Lloyd, T., Young, J., & Ward, J., (2001). Evidence
databases, the internet, and general practitioners: The New Zealand
story. New Zealand Medical Journal, 114(1127), 89.
45. Khan, L., Mcleod, D., & Shahabi, C., (2001). An adaptive probe-based
technique to optimize join queries in distributed internet databases.
Journal of Database Management (JDM), 12(4), 3–14.
46. Khannedy, E. K., (2011). MySQL Dan Java Database Connectivity
(Vol. 1, pp. 4–9). Bandung: StripBandung.
47. Kiley, R., (1997). Medical databases on the internet: Part 1. Journal of
the Royal Society of Medicine, 90(11), 610–611.
48. Kötter, R., (2004). Online retrieval, processing, and visualization
of primate connectivity data from the CoCoMac database.
Neuroinformatics, 2(2), 127–144.
49. Kuan, L., Li, Y., Lau, C., Feng, D., Bernard, A., Sunkin, S. M., & Ng,
L., (2015). Neuroinformatics of the Allen mouse brain connectivity
atlas. Methods, 73(1), 4–17.
50. Lamb, J., (2007). The connectivity map: A new tool for biomedical
research. Nature Reviews Cancer, 7(1), 54–60.
51. Lee, J. M., Kyeong, S., Kim, E., & Cheon, K. A., (2016). Abnormalities
of inter-and intra-hemispheric functional connectivity in autism
spectrum disorders: A study using the autism brain imaging data
exchange database. Frontiers in Neuroscience, 10(1), 191.
52. Lemkin, P. F., Thornwall, G. C., & Evans, J., (2005). Comparing
2-D electrophoretic gels across internet databases. The Proteomics
Protocols Handbook, 1, 279–305.
53. Li, Z., & Yang, L., (2020). Underlying mechanisms and candidate drugs
for COVID-19 based on the connectivity map database. Frontiers in
Genetics, 11, 558557.
54. Liu, T. P., Hsieh, Y. Y., Chou, C. J., & Yang, P. M., (2018). Systematic
polypharmacology and drug repurposing via an integrated L1000-
based connectivity map database mining. Royal Society Open Science,
5(11), 181321.
55. Liu, X., Liu, L. C., Koong, K. S., & Lu, J., (2003). An examination of
job skills posted on internet databases: Implications for information
systems degree programs. Journal of Education for Business, 78(4),
191–196.
Database Connectivity and Web Technologies 213
56. Liu, Z., Du, X., & Ishii, N., (1998). Integrating databases in internet. In:
1998 Second International Conference. Knowledge-Based Intelligent
Electronic Systems: Proceedings KES’98 (Cat. No. 98EX111) (Vol. 3,
pp. 381–385). IEEE.
57. Luo, B., Gu, Y. Y., Wang, X. D., Chen, G., & Peng, Z. G., (2018).
Identification of potential drugs for diffuse large b-cell lymphoma
based on bioinformatics and connectivity map database. Pathology-
Research and Practice, 214(11), 1854–1867.
58. Mai, P. T. A., Nurminen, J. K., & Di Francesco, M., (2014). Cloud
databases for internet-of-things data. In: 2014 IEEE International
Conference on Internet of Things (iThings), and IEEE Green Computing
and Communications (GreenCom) and IEEE Cyber, Physical and
Social Computing (CPSCom) (Vol. 1, pp. 117–124). IEEE.
59. Manzotti, G., Parenti, S., Ferrari-Amorotti, G., Soliera, A. R., Cattelani,
S., Montanari, M., & Calabretta, B., (2015). Monocyte-macrophage
differentiation of acute myeloid leukemia cell lines by small molecules
identified through interrogation of the connectivity map database. Cell
Cycle, 14(16), 2578–2589.
60. Meng, W., Liu, K. L., Yu, C., Wang, X., Chang, Y., & Rishe, N., (1998).
Determining Text Databases to Search in the Internet, 1, 4, 5.
61. Migliore, L. A., & Chinta, R., (2017). Demystifying the big data
phenomenon for strategic leadership. SAM Advanced Management
Journal, (07497075), 82(1).
62. Minkiewicz, P., Darewicz, M., Iwaniak, A., Bucholska, J., Starowicz,
P., & Czyrko, E., (2016). Internet databases of the properties, enzymatic
reactions, and metabolism of small molecules—Search options and
applications in food science. International Journal of Molecular
Sciences, 17(12), 2039.
63. Minkiewicz, P., Iwaniak, A., & Darewicz, M., (2015). Using internet
databases for food science organic chemistry students to discover
chemical compound information. Journal of Chemical Education,
92(5), 874–876.
64. Moffatt, C., (1996). Designing client-server applications for enterprise
database connectivity. In: Database Reengineering and Interoperability
(Vol. 1, pp. 215–234). Springer, Boston, MA.
65. Mohr, E., Horn, F., Janody, F., Sanchez, C., Pillet, V., Bellon, B., &
Jacq, B., (1998). FlyNets and GIF-DB, two internet databases for
214 The Creation and Management of Database Systems
76. Sanin, C., & Szczerbicki, E., (2006). Extending set of experience
knowledge structure into a transportable language extensible markup
language. Cybernetics and Systems: An International Journal, 37(2,
3), 97–117.
77. Saxena, V., & Kumar, S., (2012). Object-Oriented Database
Connectivity for Hand Held Devices, 1, 4–8.
78. Shahabi, C., Khan, L., & McLeod, D., (2000). A probe-based technique
to optimize join queries in distributed internet databases. Knowledge
and Information Systems, 2(3), 373–385.
79. Shum, A. C., (1997). Open Database Connectivity Development of the
Context Interchange System (Vol. 1, pp. 2–5). Doctoral dissertation,
Massachusetts Institute of Technology.
80. Song, H., & Gao, L., (2012). Use ORM middleware realize
heterogeneous database connectivity. In: 2012 Spring Congress on
Engineering and Technology (Vol. 1, pp. 1–4). IEEE.
81. Sperberg-McQueen, C. M., (2000). Extensible Markup Language
(XML) 1.0 (Vol. 1, pp. 4–9). World Wide Web Consortium.
82. Stephan, K. E., Kamper, L., Bozkurt, A., Burns, G. A., Young, M. P., &
Kötter, R., (2001). Advanced database methodology for the collation
of connectivity data on the macaque brain (CoCoMac). Philosophical
Transactions of the Royal Society of London; Series B: Biological
Sciences, 356(1412), 1159–1186.
83. Stephens, L. M., & Huhns, M. N., (1999). Database Connectivity Using
an Agent-Based Mediator System. Univ. of S. Carolina, report A, 38.
84. Sylvester, R. K., (1997). Incorporation of internet databases into
pharmacotherapy coursework. American Journal of Pharmaceutical
Education, 61(1), 50–54.
85. Ternon, E., Agyapong, P., Hu, L., & Dekorsy, A., (2014). Database-
aided energy savings in next generation dual connectivity heterogeneous
networks. In: 2014 IEEE Wireless Communications and Networking
Conference (WCNC) (Vol. 1, pp. 2811–2816). IEEE.
86. Van, D. S., (1999). Free patent databases on the internet: A critical
view. World Patent Information, 21(4), 253–257.
87. Van, S. M. A. M., & Winter, R. M., (1998). Internet databases for
clinical geneticists‐an overview 1. Clinical Genetics, 53(5), 323–330.
88. Vecchio, F., Miraglia, F., Judica, E., Cotelli, M., Alù, F., & Rossini,
P. M., (2020). Human brain networks: A graph theoretical analysis of
216 The Creation and Management of Database Systems
CONTENTS
8.1. Introduction..................................................................................... 218
8.2. The Role of a Database in an Organization...................................... 220
8.3. Introduction of a Database............................................................... 222
8.4. The Evolution of Database Administration Function......................... 224
References.............................................................................................. 230
218 The Creation and Management of Database Systems
8.1. INTRODUCTION
To determine the monetary worth of data, consider what is recorded in a
company’s database: information on users, vendors, inventories, activities,
etc. How many chances would be wasted if the data is destroyed? What
exactly is the importance of data damage? A business whose whole
information is destroyed, for instance, would pay enormous costs and
expenses (Mata-Toledo & Reyes-Garcia, 2002). Throughout tax season,
the accountancy firm’s troubles would be exacerbated by a loss of data.
Data loss sets every business in a precarious situation. The firm may be not
capable of successfully managing everyday operations, it may lose clients
who expect quick and professional assistance, and it may miss out on the
chance to increase the customer base (Bertino & Sandhu, 2005).
Information is a useful resource that may be derived from data. If the
information is precise and accurate, it is necessary to motivate activities
that strengthen the quality of its products and produce wealth. In practice,
a company is susceptible to a data-information-decision loop; that is, the
data owner appears to apply intelligence to data to generate information
that serves as the foundation for the knowledge of the user when making
choices. Figure 8.1 depicts the cycle in question (Leong-Hong & Marron,
1978).
Source: https://slideplayer.com/slide/5985787/.
As seen in Figure 8.1, choices taken by upper-level managers result in
responses at lower organizational stages. These acts provide extra data to
Database Administration and Security 219
monitor the functioning of the firm. The extra data must now be reused
inside the context of data-information-decision making. Consequently,
statistics serve as the foundation for decision-making, long-term strategy,
monitoring, and operational tracking (Zygiaris, 2018).
Effective asset control is a fundamental performance element for
every firm. To arrange information as a business asset, executives must
comprehend the significance of analyzed information and data. There are
businesses (such as the one that gives credit files) that primary product is
data and one whose viability is entirely dependent on the data administration
(Said et al., 2009). Most firms are always looking for innovative methods
to maximize the value of their collected data. This advantage may manifest
in many ways, including data warehouses that allow enhanced relationship
management as well as a closer connection with suppliers and customers to
assist computerized logistics operations. As businesses grow more reliant
on data, the precision of that data grows increasingly vital. Such firms
face an even larger danger from soiled data, which includes inaccurate and
inconsistent information. Data may get soiled for several causes, including
(Bullers Jr et al., 2006):
• Absence of authenticity constraint implementation (not null,
uniqueness, referential integrity, etc.;
• Data entry punctuation mistakes;
• Utilization of equivalents and/or homophones throughout many
systems;
• Utilization of nontraditional acronyms in character information;
and
• Distortions of composite characteristics into basic attributes vary
amongst systems.
Many reasons for dirty data may be handled at the level of the database,
like the application of constraints correctly. Therefore, resolving the other
sources of stale information is more difficult. The migration of data between
networks, like in the establishment of a database system, is one cause of
soiled data. Data quality measures are often considered as attempts to
regulate soiled data (Tahir & Brézillon, 2013).
Data quality is an all-encompassing strategy for guaranteeing the
correctness, authenticity, and consistency of the data. The notion that
the quality of the data is exhaustive is crucial. Quality of information is
focused with over simply cleansing dirty data; also, it seeks to prevent
220 The Creation and Management of Database Systems
new data mistakes and boost user trust in the information. Large-scale data
quality efforts are often complicated and costly. Therefore, these activities
must be aligned with company objectives and have the support of senior
management. Although data quality initiatives vary widely from organization
to organization, the majority incorporate a combination of (Paul & Aithal,
2019):
• A framework of data governance accountable for data integrity;
• Evaluations of the present data integrity;
• Creation of data quality requirements following enterprise
objectives; and
• integration of tools and procedures to assure the integrity of the
new dataset.
Several tools may aid in the execution of data quality efforts.
Particularly, several manufacturers provide data characterization and master
data management (MDM) tools to aid in guaranteeing data quality. The
application that makes up data profiling technology collects metrics and
evaluates existing data sources. These programs evaluate current sets of
data to find sequences in data and thus can match the current sequences
in data to organizationally-defined criteria (El-Bakry & Hamada, 2010).
This study may assist the business in understanding the performance of the
manufactured data and identifying sources of soiled data. MDM software
aids in the prevention of stale data by organizing shared information across
many systems. MDM offers a _master_ copy of objects, like users, that
exist across several organizational systems. Even though these technology
techniques contribute significantly to data integrity, the total answer for high-
quality data inside an organization depends mainly on data management and
administration (Kahn & Garceau, 1985).
metaphor: a hammer may help a craftsman make woodwork, but it can also
harm the grasp of a youngster. The presence of a computer central database
is not the answer to a company’s issues; instead, its proper administration
and utilization are (King, 2006).
The implementation of a DBMS involves a major shift and challenge;
the DBMS can make a significant influence on the company, which may be
favorable or bad depending on how it is managed. One important factor,
for instance, is tailoring the DBMS to the company rather than pushing
the company to conform to the DBMS (Yarkoni et al., 2010). The primary
concern ought to be the demands of the company, not the parts as shown in
the figure of the DBMS. However, implementing a DBMS cannot be done
without hurting the company. The stream of fresh development management
data has a significant impact on how the company performs and, as a result,
its company culture (Motomura et al., 2008).
The implementation of a DBMS within an enterprise has been defined
as a three-step process that contains three key components (Schoenbachler
& Gordon, 2002):
• Technological. Database management system computer
equipment;
• Managerial and administrative functions; and
• Cultural. Corporate aversion to change.
The technical part consists of choosing, implementing, setting, and
maintaining the DBMS to ensure that it manages data storage, access, and
security effectively. The individual or persons in charge of dealing with
the technological aspects of the DBMS system should have the technical
abilities required to give or obtain acceptable assistance for the DBMS’s
multiple users: programmers, administrators, and end-users. As a result,
database administration manpower is a critical technical concern in the
DBMS implementation. To ensure a successful move to the new social
context, the chosen employees must have the correct balance of technical
and administrative abilities (Kalmegh & Navathe, 2012).
The management component of DBMS implementation should not
be overlooked. A high-quality DBMS, like having the greatest racing car,
does not ensure a high-quality information system (Dunwell et al., 2000).
The implementation of a DBMS into an organization requires meticulous
preparation to develop an appropriate leadership system to support the
person or individuals in charge of managing the DBMS. A very well checking
and regulating function should be applied to the organizational structure.
224 The Creation and Management of Database Systems
The introduction of the DBMS and its shared view of data resulted in a
new stage of data management complexity, transforming the DP department
into an information systems (IS) division (Sherif, 1984):
• A service function to offer end-users continuous data management
assistance was added to the IS department’s duties.
• A production function that uses integrated app or management
computational modeling to give end-users customized solutions
for their data needs.
The IS department’s organization’s internal design mirrored its functional
emphasis. Figure 8.2 depicts how most IT departments were organized. The
IS app development section was divided up by the category of the backed
system as the supply for app development expanded: financial reporting,
stock, advertising, and so on (Mistry et al., 2013). Even so, because of this
advancement, the data management duties were split. The database operations
section was in control of applying, tracking, and attempting to control the
DBMS operations, while the app development section was in process of
organizing database specifications and logical data layout (Gillenson, 1991).
Source: https://www.researchgate.net/figure/IIASAs-internal-organizational-
structure_fig1_318585146.
The surface area as well as the role of the DBA function, as well as its
location within a company’s activities, differ from one company to the next.
The DBA role may be classified as either a staff or a line position in the
226 The Creation and Management of Database Systems
organization structure (Barki et al., 1993). Placing the DBA role on staff
often results in a consulting environment, in which the DBA may establish
a data administration plan but lacks the power to enforce it or handle any
disputes. In a line role, the DBA is responsible for planning, defining,
implementing, and enforcing the rules, standards, and procedures utilized in
the data administration activities. Figure 8.3 illustrates the two alternative
DBA function positions (Jain & Ryu, 1988).
Source: https://slideplayer.com/slide/13196309/.
How well the DBA role fits within an organizational process is not
standardized. In part, this is since the DBA function is perhaps the most
flexible of all organizational roles. In reality, the rapid evolution of DBMS
technology necessitates a shift in organizational structures (Weber &
Everest, 1979):
• The growth of database systems may compel a business to
democratize its data management role. The distributed system
enables the System Administrator to establish and assign the
duties of every local DBA, hence putting new and complicated
coordination activities on the systems DBA.
Database Administration and Security 227
Source: https://documen.site/download/chapter-15–29_pdf.
Consider that a business may have many incompatible DBMSs
deployed to serve distinct processes. For instance, it is fairly unusual for
organizations to have a hierarchical DBMS to handle daily transactions at
the top management and a database system to meet the ad hoc data needs of
middle and upper management (LEONARD, 1990). Several microcomputer
DBMSs may also be implemented in the various departments. In such a
scenario, the business may allocate one DBA to each DBMS. Figure 8.5
depicts the job of a systems administrator, also known as the general
coordinator of all DBAs (Ramanujam & Capretz, 2005).
Source: http://onlineopenacademy.com/database-administrator/.
Database Administration and Security 229
REFERENCES
1. Aiken, P., Gillenson, M., Zhang, X., & Rafner, D., (2013). Data
management and data administration: Assessing 25 years of practice.
In: Innovations in Database Design, Web Applications, and Information
Systems Management (Vol. 1, pp. 289–309). IGI Global.
2. Amano, K., & Maeda, T., (1987). Database management in research
environment. In: Empirical Foundations of Information and Software
Science III (Vol. 1, pp. 3–11). Springer, Boston, MA.
3. Armstrong, M. P., & Densham, P. J., (1990). Database organization
strategies for spatial decision support systems. International Journal
of Geographical Information Systems, 4(1), 3–20.
4. Barki, H., Rivard, S., & Talbot, J., (1993). A keyword classification
scheme for IS research literature: An update. MIS Quarterly, 1, 209–
226.
5. Bertino, E., & Sandhu, R., (2005). Database security-concepts,
approaches, and challenges. IEEE Transactions on Dependable and
Secure Computing, 2(1), 2–19.
6. Bhardwaj, A., Singh, A., Kaur, P., & Singh, B., (2012). Role of
fragmentation in distributed database system. International Journal of
Networking & Parallel Computing, 1(1), 2–7.
7. Buhrmester, D., (1998). Need Fulfillment, Interpersonal Competence,
and the Developmental Contexts of Early Adolescent Friendship, 1,
1–9.
8. Bullers, Jr. W. I., Burd, S., & Seazzu, A. F., (2006). Virtual machines-
an idea whose time has returned: Application to network, security, and
database courses. ACM SIGCSE Bulletin, 38(1), 102–106.
9. Chen, J., Hong, H., Huang, M., & Kubik, J. D., (2004). Does fund size
erode mutual fund performance? The role of liquidity and organization.
American Economic Review, 94(5), 1276–1302.
10. Chen, X., Yang, H., Liu, G., & Zhang, Y., (2021). NUCOME: A
comprehensive database of nucleosome organization referenced
landscapes in mammalian genomes. BMC Bioinformatics, 22(1), 1–15.
11. Dewett, T., & Jones, G. R., (2001). The role of information technology
in the organization: A review, model, and assessment. Journal of
Management, 27(3), 313–346.
12. Dunwell, J. M., Khuri, S., & Gane, P. J., (2000). Microbial relatives of
the seed storage proteins of higher plants: Conservation of structure and
Database Administration and Security 231
A competent judgment 5
complex relational data software 56
Active Server Pages (ASPs) 188
Component Object Model (COM)
ActiveX Data Objects (ADO) 188,
186
200
computer-based programs 3
Ada 81
computer database 6
advertising 225
computer language 7
Amazon 2
computer simulation 2
asset control 219
conceptual design 149
authenticity constraint 125
Conference on Data Systems and
automatic transmission 56
Languages 74
B
D
basic application programming in-
Data 45, 47, 48, 52, 54, 56, 66, 69,
terface (API) 182
70, 72
budget 140
data administration 54, 219, 224,
business rules 48, 50, 51, 52, 66, 67,
226, 230
68, 69, 70, 71, 72
database architecture 47, 51
C database configuration 52
Database connectivity 180, 181, 211
C# 7, 32
database design 141, 143, 146, 147,
cloud services 2
149, 150, 151, 152, 153, 154,
Cloud storage 2
155, 156, 158
COBOL 81, 84
Database development 143
commercial contract 52
database management systems
commercial database management
(DBMSs) 2
systems 74
236 The Creation and Management of Database Systems