Professional Documents
Culture Documents
SAD-chap6 (Update Mac2021)
SAD-chap6 (Update Mac2021)
Chapter 7 6
Contents
1. Data design concepts
2. DBMS components
3. Web-based database design
4. Data design terminology
5. Data relationship
6. Normalization
7. Database models
8. Data storage
9. Data control
6.1 Data design concepts
Data Design Concept
Data Structure
Is a framework for organizing & storing data
Consist of files / tables - link in various way
files / tables ➔ contains data about people, places,things
or event
Have 2 types of data structures:
File-Oriented System
Database Management System
Itsdepend on how the system’s file & tables are
organized & link
Data Design Concept
File Processing System / File Oriented System
Data Design Concept
Database Management System
Data Design Concept
File-oriented system
Stores & managed data in one / more separate
file – called File Processing
Use to handle large volumes of structured data
Older system utilized it, because its suited to
mainframe hardware & batch input
Less common today, but in certain situation it
is more efficient & cost less than DBMS
Disadvantage:
Data Redundancy – Same data is stored in more
than one place
Data Integrity – Update are not applied in every
file
Rigid Data Structure – Slow & inefficient in
retrieving information
Data Design Concept
Types of File for File Processing System
History File➔ a history file is a file copy created and saved for
historical or archiving purposes. New history files, unlike new
security files, do not replace the old files
6.2 DBMS components
DBMS Components
Advantages of DBMS:
Scalability
Client Server
Economy Scale
Flexible Data Sharing
Enterprise-Wide Application
Stronger Standards
Controlled Redundancy
Better Security
Increased Programmer Productivity
Data Independence
DBMS Components
DBMS Tradeoffs:
More expensive hardware, software, data networks
for supporting multi user environment
❑ In addition to interfaces
for users, database
administrators, and
related systems, a
DBMS also has a data
manipulation language,
a schema and sub-
schemas, and a physical
data repository
DBMS Components
DBMS Components:
❑Users
• Query language
allows a user to specify a task without specifying how the task will
be accomplished.
• Query by example (QBE)
allows the user to provide an example of the
data requested.
• SQL (structured query language)
a query language that allows PC users to
communicate with servers and mainframe
computers.
❑ Database Administrators
• A DBA is responsible for DBMS management and support
DBMS Components
❑ Related information systems
• A DBMS can support several related information systems that
provide input to, and require specific data from, the DBMS
❑ Data Manipulation Language
• A data manipulation language (DML) controls database operations,
including storing, retrieving, updating, and deleting data
❑ Schema
• The complete definition of a database, including descriptions of all
fields, tables, and relationships.
• Sub-schemas
A subschema defines only those portions of the database that a
particular system or user needs or is allowed to access.
❑ Physical Data Repository
• The data dictionary is transformed into a physical data repository,
which also contains the schema and sub-schemas
• The physical repository might be centralized, or distributed at
several locations.
6.3 Web-based database design
Web Based Database Design
Web Based Database Design
Internet Terminology:
Web browser
Web page
HTML – Hypertext Markup Language
Web server
Web site
Intranet
Extranet
Protocols
Web-centric
Clients
Servers
Web Based Database Design
Web Based Database Design
❑ Data Security
• Web-based data must be totally secure, yet easily accessible
to authorized users
Entity
Table / File
Field
Record
Key Field
Primary Key
Candidate Key
Foreign Key
Secondary Key
Referential Integrity
6.5 Data relationships
Entity Relationship Diagram
ERD
➔Types of Relationship:
•One-to-one relationship (1:1)
•One-to-many relationship (1:M)
•Many-to-many relationship (M:N)
Database Design: One Step at a Time
❑ Relational Databases
• The relational model was introduced during the 1970s and became
popular because it was flexible and powerful
• Because all the tables are linked, a user can request data that
meets specific conditions
• New entities and attributes can be added at any time without
restructuring the entire database
❑ Object-Oriented Databases
• Many systems developers are using object-oriented database
(OODB) design as a natural extension of the object-oriented analysis
process
6.8 Data storage
Data Storage & Access
❑Data Warehousing
• A data warehouse is an integrated collection
of data that can support management
analysis and decision making.
❑Data Mining
• Data mining software looks for meaningful
patterns and relationships among data. For
example, data mining software could help a
consumer products firm identify potential
customers based on their prior purchases.
Data Storage & Access
❑Logical storage
• As seen through a user’s eyes
❑Logical record
• A logical record contains field values that describe a
single person, place, thing, or event
❑Physical storage
• Is strictly hardware-related, because it involves the
process of reading and writing binary data to physical
media such as a hard drive or CD-ROM.
Data Storage & Access
Data Storage Format
All data are stored in the form of binary digits, that have
only 2 possible values (0 or 1).There are 4 primary data
storage formats:-
❑Binary digits
A format that offers efficient storage of numeric data.
❑EBCDIC and ASCII
A data storage method used on most mainframe
computers.
❑Unicode
Unicode requires 16 bits per character, which allows it
to represent more than 65,000 unique characters.
Data Storage & Access
Data Field
❑International Organization for
Standardization (ISO)
❑ YYYYMMDD
❑ Easy for comparison or sorting
❑Absolute date
❑ Total number of days from a specific base date.
❑ Starts on Jan 1, 1990.
❑ So in August 27, 2004 – 38226 days
❑ Its good for calculation purposes
6.9 Data control
Data Storage & Access
Data Control
❑File and database control must include all measures necessary
to ensure that data storage is correct, complete, and secure
❑Must provide built-in control and security including:
❑Subschema, password, encryption, audit trail files, back-up &
recovery.
❑Limiting access to files and database.
❑Permission: different privileges given to group of people.
❑Encryption: converting readable data into unreadable
characters to prevent unauthorized access.
❑Backup & recovery: restore the files or database to its current
state at the time of the last backup.
❑Audit log files: record details of all access and changes made.
❑Audit fields: recorded during audit log files. Special fields
within data records to provide additional control or security
information.