Identifying Physical Database Requirements
Identifying Physical Database Requirements
ADMAS UNIVERSITY
Learning Guide
Unit of Competence: Identify Physical Database Requirements
Module Title: Identifying Physical Database Requirements
LG Code: EIS DBA3 020811
TTLM Code: EIS DBA3M 020811
1. Identify 1.1 Requirements of the user and current system architecture are reviewed
database 1.2 Database size is determined from requirements and technical specifications
scope
1.3 Database and scope of project are documented
1.4 Several database management systems are evaluated against requirements
and make appropriate selection
2. Identify 2.1 Technical specifications are reviewed for the database
database 2.2 Database tables and relationships are identified
requirements
2.3 Database data dictionary, table attributes and keys are identified
2.4 Database reports are developed based on acceptance criteria and
requirements
3. Identify 3.1 System security plan is reviewed
security 3.2 Chosen database management system and user security required for the
requirements database clarified and confirmed to ensure database security is aligned to
security system plan
3.3 Database performance, recovery and audit trail needs are identified, evaluated
and recorded
4. Seek client 4.1 Database scope and technical requirements are presented to user for
feedback and feedback
approval 4.2 User feedback are reviewed and database adjusted as required
4.3 Database and documentation are presented to user for final approval
Guarantee the appropriate physical amount of disk space required to store the data and indexes.
Estimating the size of a database can also help you determine whether the database design needs refining.
In E-R Diagram, an entity type is represented by a rectangle, and the name is indicated in capital letters.
Example:
DEPARTMENT EMPLOYEE
-Country to people, mother to children, department to students, and people to religion are of one-to- many
relationships.
* Many-to-many: - one instance of an entity )A) is associated with zero, one or many instances of another entity
(B), and one instance of entity (B) is associated with zero, one or many instances of entity (A).
Example: - the works_on relationship between employee and project
- Students to course, employee to projects, and people to language are of many-to- many relationship.
Data dictionaries do not contain any actual data from the database, only bookkeeping information for managing it.
What is an advantage of a Data Dictionary?
When a new user is introduced to the system or a new administrator takes over the system, identifying table
structures and types becomes simpler.
Table attributes
- An attribute is a property that describes an entity.
- Each attribute has a particular value based on the defined data type.
- The set of all possible (allowable) values of an attribute is called attribute domain.
- As a convention, attributes are named with an initial capital letter followed by lowercase letters.
- In E-R Diagram, an attribute can be represented by an ellipse (oval) shape with a line connected it to the
associated entity. Example:
- It can also be represented by listing them within the entity rectangle, under the entity name.
Example: EMPLOYEE
Emp_Id
Fname
Lname
*
*
*
Types of attributes
An attribute can be: - simple or composite, single-value or multi-value, stored or derived or null able.
1) Simple (Atomic) vs Composite attribute
. Simple attributes cannot be further divisible; whereas Composite attributes can be divided into
smaller subparts.
› ID, Salary, Gender, etc are examples of simple attributes.
› Name, Address, etc are examples of composite attributes
. In E-R Diagram, simple attributes can be represented by an ellipse shape. Example:
. In E-R Diagram, composite attributes can be represented by branched ellipse shape:
Example:
. The value of composite attribute is the concatenation of the values of its constituent simple attributes.
2) Single-valued vs Multi-valued attributes
- Most attributes have a single value for a particular entity.
- In some cases, an attribute can have a set of value for the same entity, called multi-valued.
Example: colour attribute for a car, college degree for a person.
- In E-R Diagram, Multi-valued attributes can be represented by double ellipse (oval) shape.
3) Stored vs derived attributes
. In some cases, the value of two or more attributes can be related.
Example: the Age and Birth-Date attributes of a person
Key attributes
- Attributes can be classified as identifiers or descriptors.
- Identifiers (more commonly called keys or key attributes) which uniquely identify each instance of an
entity, called candidate key. If such an attribute doesn't exist naturally, a new attribute is defined for that purpose,
for example an ID number or code.
- In some cases, more than one attribute is required to identify a unique entity, called composite candidate key.
- A descriptor describes a non-unique characteristic of an entity instance.
- When identifying attributes of entities, identifying key attribute is very important.
- In E-R Diagram, key attributes (identifiers) can be represented by ellipse shape with underline.
* Candidate Key is a super key whose values are not repeated in the table records.
- It is a super key that contains only the minimum number of columns necessary for unique identification.
- When the values in a super key are not repeated in the table’s records, then such a key is called a candidate key.
- It is possible to have more than one choice of candidate key in a particular table. In that case, the selection of the
primary key would be driven by the designer’s choice or by end user requirements.
* Primary Key is a candidate key which doesn’t have repeated values nor does it comes with a NULL value
in the table.
- A primary key in any table is both a super key as well as a candidate key.
- The candidate keys that are not selected to be the primary key are called alternate keys.
- Every entity in the data model must have a primary key whose values uniquely identify instances of the entity.
* Alternate key is the candidate keys that are not selected as the primary key of the entity.
* A foreign key is a column or group of columns in a relational database table that is used to establish and
enforce a link between data in two tables. You can create a foreign key by defining a FOREIGN KEY constraint
when you create or modify a table.
2.4. Developing database reports using acceptance criteria
What does Database Reports mean?
Database reports are the formatted result of database queries and contain useful data for decision-making and
analysis. Most good business applications contain a built-in reporting tool; this is simply a front-end interface that
calls or runs back-end database queries that are formatted for easy application usage.
For example, a banking software application may contain specifically defined reports on all customers with large
deposits or reports on monthly loan summaries for all customers.
- Database reports are developed based on acceptance criteria and requirements.
The reports are normally used to provide hard copy printouts for reviews at meetings or to mark up the information
in your database that needs updating.
network from unauthorized access and also ensure that employees have adequate access to the network and
resources to work.
- DBMS
Database Security means protection of the: - data from malicious attempts to steal (view) or modify data.
- Database from unauthorized users.
3.2 Clarifying and confirming DBMS and user security
Security within the DBMS protects the integrity of the data, records and databases. It can provide encryption
protection at the data level.
Database Security means protection of the: - data from malicious attempts to steal (view) or modify data.
- Database from unauthorized users.
- Data security covers access and use of database objects (such as tables and views) and the actions that users can
have on the objects.
- User security lets your application use security rules to determine what it shows.
3.3 Identifying, evaluating and recording DB performance recovery and audit trails.
What is auditing
Auditing is the monitoring and recording of selected user database actions.
Database performance can be defined as the optimization of resource use to increase throughput and minimize
contention, enabling the largest possible workload to be processed.
Database Recovery is responsible for preserving the database consistency after a failure of any kind (transaction,
system or media). Relevant information solely for recovery is saved in a log during normal transaction processing.
Recovery performance focuses primarily on crash recovery rather than on recovery after restoring a backup.
However, optimizations are possible for recovery after restoring from a backup.
An audit trail (or audit log) is a record showing who has accessed a computer system and what operations he or she
has performed during a given period of time. Audit trails are useful both for maintaining security and for recovering
lost transactions.
Most accounting systems and database management systems include an audit trail component. In addition, there are
separate audit trail software products that enable network administrators to monitor use of network resources.
Database auditing involves observing a database so as to be aware of the actions of database users.
Database administrators and consultants often set up auditing for security purposes.
LO4. Seek Client feedback and approval
Presenting DB scope and technical requirements to user for feedback
Present database scope, technical requirements and security documentation to user for feedback is very important to
develop a successful database.
. Review user feedback and adjust database as required
. Present database and documentation to user for final approval
What is feedback?
Feedback is a Process in which the effect or output of an action is 'returned' to modify the next action.
Reviewing user feedback to adjust DB.
Presenting DB and documentation to user for final approval