Você está na página 1de 27

Relational DataBase Management

System
(RDBMS)
• The DBMS whose designed is based on
relational theory in mathematics is called
RDBMS.
• RDBMS packages are Oracle, Sybase and
Informix etc.
• It supports largest of databases .It also
provide access to many concurrent users.
Difference between DBMS & RDBMS

• DBMS: It allows only one person to access the


database at a given time.

• RDBMS: It allows many users simultaneously


to access the database.
Relational Database Management System
(RDBMS)
A DBMS that is based on relational model is called as
RDBMS. Relation model is most successful mode of all three
models. Designed by E.F. Codd, relational model is based on the
theory of sets and relations of mathematics. Relational model
represents data in the form a table. A table is a two dimensional
array containing rows and columns. Each row contains data
related to an entity such as a student. Each column contains the
data related to a single attribute of the entity such as student
name.
One of the reasons behind the success of relational
model is its simplicity. It is easy to understand the data and easy
to manipulate.Another important advantage with relational
model, compared with remaining two models is, it doesn’t bind
data with relationship between data item. Instead it allows you
to have dynamic relationship between entities using the values
of the columns. Almost all Database systems that are sold in the
market, now- a-days, have either complete or partial
implementation of relational model.
Relational Database: Definitions
• Relational database: a set of relations.
• Relation: made up of 2 parts:
– Schema : specifies name of relation, plus name and type of
each column.
• E.g. Students(sid: string, name: string, login: string, age:
integer, gpa: real)
– Instance : a table, with rows and columns.
• #rows = cardinality
• #fields = degree / arity
• Can think of a relation as a set of rows or tuples.
– i.e., all rows are distinct
Example: University Database
View 1 View 2 View 3
• Conceptual schema:
– Students(sid: string, name: string,
Conceptual Schema
login: string, age: integer, gpa:real)
– Courses(cid: string, cname:string, Physical Schema
credits:integer)
– Enrolled(sid:string, cid:string,
grade:string) DB
• External Schema (View):
– Course_info(cid:string,enrollment:integer)
• One possible Physical schema :
– Relations stored as unordered files.
– Index on first column of Students.
Keys
• Keys are a way to associate tuples in
different relations
• Keys are one form of integrity constraint
(IC)
Enrolled Students
sid cid grade
sid name login age gpa
53666 Carnatic101 C
53666 Reggae203 B 53666 Jones jones@cs 18 3.4
53650 Topology112 A 53688 Smith smith@eecs 18 3.2
53666 History105 B 53650 Smith smith@math 19 3.8

FORIEGN Key PRIMARY Key


Figure shows how data is represented in relational model and
what are the terms used to refer to various components of a
table. The following are the terms used in relational model.
Tuple / Row
A single row in the table is called as tuple. Each row represents the
data of a single entity.
Attribute / Column
A column stores an attribute of the entity. For example, if details of
students are stored then student name is an attribute; course is
another attribute and so on.
Column Name
Each column in the table is given a name. This name is used to
refer to value in the column.

Table Name
Each table is given a name. This is used to refer to the table. The
name depicts the content of the table.

The following are two other terms, primary


key and foreign key, that are very important
in relational model.
Primary Keys
• A set of fields is a superkey if:
– No two distinct tuples can have same values in all key fields
• A set of fields is a candidate key for a relation if :
– It is a superkey
– No subset of the fields is a superkey
• what if >1 key for a relation?
– one of the candidate keys is chosen (by DBA) to be the primary key.
E.g.
– sid is a key for Students.
– What about name?
– The set {sid, gpa} is a superkey.
Primary and Candidate Keys in SQL
• Possibly many candidate keys (specified using
UNIQUE), one of which is chosen as the primary key.

• Keys must be used carefully!


• “For a given student and course, there is a single grade.”

REATE TABLE Enrolled CREATE TABLE Enrolled


(sid CHAR(20) (sid CHAR(20)
cid CHAR(20), vs. cid CHAR(20),
grade CHAR(2), grade CHAR(2),
PRIMARY KEY (sid,cid)) PRIMARY KEY (sid),
UNIQUE (cid, grade))
“Students can take only one course, and no two students
in a course receive the same grade.”
Primary Key
A table contains the data related entities. If you take STUDETNS table, it
contains data related to students. For each student there will be one row in
the table. Each student’s data in the table must be uniquely identified. In
order to identify each entity uniquely in the table, we use a column in the
table. That column, which is used to uniquely identify entities (students) in
the table is called as primary key. In case of STUDENTS table (see figure)
we can use ROLLNO as the primary key as it in not duplicated. So a primary
key can be defined as a set of columns used to uniquely identify rows of a
table. Some other examples for primary keys are account number in bank,
product code of products, employee number of an employee.

Composite Primary Key


In some tables a single column cannot be used to uniquely identify entities
(rows). In that case we have to use two or more columns to uniquely identify
rows of the table. When a primary key contains two or more columns it is
called as composite primary key. In figure, we have PAYMENTS table,
which contains the details of payments made by the students. Each row in
the table contains roll number of the student, payment date and amount
paid. Neither of the columns can uniquely identify rows. So we have to
combine ROLLNO and DP to uniquely identify rows in the table. As
primary key is consisting of two columns it is called as composite primary
key.
Foreign Keys, Referential Integrity
• Foreign key : Set of fields in one relation that is
used to `refer’ to a tuple in another relation.
– Must correspond to the primary key of the other
relation.
– Like a `logical pointer’.

• If all foreign key constraints are enforced,


referential integrity is achieved (i.e., no
dangling references.)
Foreign Key
In relational model, we often store data in different tables and put them
together to get complete information. For example, in PAYMENTS table
we have only ROLLNO of the student. To get remaining information
about the student we have to use STUDETNS table. Roll number in
PAYMENTS table can be used to obtain remaining information about the
student. The relationship between entities student and payment is one-to-
many. One student may make payment for many times. As we already
have ROLLNO column in PAYMENTS table, it is possible to join with
STUDENTS table and get information about parent entity (student).
Roll number column of PAYMENTS table is called as foreign key as it is
used to join PAYMENTS table with STUDENTS table. So foreign key is the
key on the many side of the relationship.

ROLLNO column of PAYMENTS table must derive its values from


ROLLNO column of STUDENTS table.
When a child table contains a row that doesn’t refer to a corresponding
parent key, it is called as orphan record. We must not have orphan
records, as they are result of lack of data integrity.
Foreign Keys in SQL
• E.g. Only students listed in the Students relation should be allowed to enroll
for courses.
– sid is a foreign key referring to Students:

CREATE TABLE Enrolled


(sid CHAR(20),cid CHAR(20),grade CHAR(2),
PRIMARY KEY (sid,cid),
FOREIGN KEY (sid) REFERENCES Students )
Enrolled
sid cid grade Students
sid name login age gpa
53666 Carnatic101 C
53666 Jones jones@cs 18 3.4
53666 Reggae203 B
53688 Smith smith@eecs 18 3.2
53650 Topology112 A
53666 History105 B 53650 Smith smith@math 19 3.8

11111 English102 A
Integrity Constraints

A mechanism used to prevent invalid data entry


into the table.

Domain integrity constraints.


Entity integrity constraints.
Referential integrity constraints.
Integrity Constraints (ICs)
• IC: condition that must be true for any instance
of the database; e.g., domain constraints.
– ICs are specified when schema is defined.
– ICs are checked when relations are modified.
• A legal instance of a relation is one that
satisfies all specified ICs.
– DBMS should not allow illegal instances.
• If the DBMS checks ICs, stored data is more
faithful to real-world meaning.
– Avoids data entry errors, too!
Integrity Rules
Data integrity is to be maintained at any cost. If data loses integrity it becomes
garbage. So every effort is to be made to ensure data integrity is maintained.
The following are the main integrity rules that are to be followed.
Domain integrity
Data is said to contain domain integrity when the value of a column is derived
from the domain. Domain is the collection of potential values. For example,
column date of joining must be a valid date. All valid dates form one domain.
If the value of date of joining is an invalid date, then it is said to violate
domain integrity.
Entity integrity
This specifies that all values in primary key must be not null and unique. Each
entity that is stored in the table must be uniquely identified. Every table must
contain a primary key and primary key must be not null and unique.
Referential Integrity
This specifies that a foreign key must be either null or must have a value that
is derived from corresponding parent key. For example, if we have a table
called BATCHES, then ROLLNO column of the table will be referencing
ROLLNO column of STUDENTS table. All the values of ROLLNO column of
BATCHES table must be derived from ROLLNO column of STUDENTS table.
This is because of the fact that no student who is not part of STUDENTS table
can join a batch
Where do ICs Come From?
• ICs are based upon the semantics of the real-world that is
being described in the database relations.
• We can check a database instance to see if an IC is
violated, but we can NEVER infer that an IC is true by
looking at an instance.
– An IC is a statement about all possible instances!
– From example, we know name is not a key, but the assertion
that sid is a key is given to us.
• Key and foreign key ICs are the most common; more
general ICs supported too.
Domain Integrity Constraints.
• ‘not null’ constraint
(eg)
Sql> create table customer (cust_id number(6)
constraint cust not null, name varchar2(20));
• ‘check’ constraint
(eg)
Sql> create table order_info (order_id number(4)
constraint checkit check (order_id>100), orderdate
date, price number(7,2));
Entity Integrity Constraints.

• ‘unique’ constraint
To prevent the duplicate values of a specified
column.
This constraint can also allow null values.
(eg)
Sql> create table price (prod_id number(6)
constraint prod_cons unique, stdprice
number(6,2), minprice number(8,2));
Entity Integrity Constraints.

• ‘primary key’ constraint


To avoid the duplicate values of a specified
column.
This constraint does not allow null values.
(eg)
Sql> create table price (prod_id number(6)
constraint prod_cons primary key, stdprice
number(6,2), minprice number(8,2));
Referential Integrity Constraint

• It establishes relationship between the two table


have the same column.
• Column in the parent table as primary key and same
column in the child table as foreign key.

(eg) create table product (prod_id number(6)


constraint prd_fk references price (prod_id),
prod_name varchar2(20));
Enforcing Referential Integrity

• Consider Students and Enrolled; sid in Enrolled is a


foreign key that references Students.
• What should be done if an Enrolled tuple with a non-
existent student id is inserted? (Reject it!)
• What should be done if a Students tuple is deleted?
– Also delete all Enrolled tuples that refer to it?
– Disallow deletion of a Students tuple that is referred to?
– Set sid in Enrolled tuples that refer to it to a default sid?
– (In SQL, also: Set sid in Enrolled tuples that refer to it to a
special value null, denoting `unknown’ or `inapplicable’.)
• Similar issues arise if primary key of Students tuple is
updated.
Relational Query Languages

• A major strength of the relational model:


supports simple, powerful querying of data.
• Queries can be written intuitively, and the DBMS
is responsible for efficient evaluation.
– The key: precise semantics for relational queries.
– Allows the optimizer to extensively re-order
operations, and still ensure that the answer does
not change.
Relational Model: Summary
• A tabular representation of data.
• Simple and intuitive, currently the most widely used
– Object-relational variant gaining ground
• Integrity constraints can be specified by the DBA, based
on application semantics. DBMS checks for violations.
– Two important ICs: primary and foreign keys
– In addition, we always have domain constraints.

• Powerful query languages exist.


– SQL is the standard commercial one
• DDL - Data Definition Language
• DML - Data Manipulation Language

Você também pode gostar