Chapter 9

advertisement
Systems Analysis and Design
9th Edition
Chapter 9
Data Design
Chapter Objectives
• Explain file-oriented systems and how they differ
from database management systems
• Explain data design terminology, including entities,
fields, common fields, records, files, tables, and key
fields
• Describe data relationships, draw an entity
relationship diagram, define cardinality, and use
cardinality notation
• Explain the concept of normalization
2
Chapter Objectives
• Explain the importance of codes and describe
various coding schemes
• Explain data warehousing and data mining
• Differentiate between logical and physical
storage and records
• Explain data control measures
3
Introduction
• Begins with a review of data design concepts
and terminology, then discusses file-based
systems and database systems, including Webbased databases
• Concludes with a discussion of data storage
and access, including strategic tools such as
data warehousing and data mining, physical
design issues, logical and physical records,
data storage formats, and data controls
4
Data Design Concepts
• Data Structures
– Each file or table
contains data about
people, places, things or
events that interact with
the information system
– File-oriented system
– Database management
system (DBMS)
5
Data Design Concepts
• Overview of File
Processing
– File processing can be
efficient and costeffective in certain
situations
– Potential problems
• Data redundancy
• Data integrity
• Rigid data structure
6
Data Design Concepts
• Overview of File Processing
– Various types of files
•
•
•
•
•
•
Master file
Table file
Transaction file
Work file
Security file
History file
7
Data Design Concepts
• The Evolution from File
Systems to Database
Systems
– A database management
system (DBMS) is a
collection of tools,
features, and interfaces
that enables users to add,
update, manage, access,
and analyze the contents
of a database
– The main advantage of a
DBMS is that it offers
timely, interactive, and
flexible data access
8
Data Design Concepts
• The Evolution from File Systems to Database
Systems
– Some Advantages
•
•
•
•
•
Scalability
Better support for client/server systems
Economy of scale
Flexible data sharing
Enterprise-wide application – database administrator
(DBA)
• Stronger standards
9
DBMS Components
• Interfaces for Users,
Database Administrators,
and Related Systems
– Users
• Query language
• Query by example (QBE)
• SQL (structured query
language)
– Database Administrators
• A DBA is responsible for
DBMS management and
support
10
DBMS Components
• Interfaces for Users, Database Administrators,
and Related Systems
– Related information systems
• A DBMS can support several related information
systems that provide input to, and require specific data
from, the DBMS
• No human intervention is required for two-way
communication
11
DBMS Components
• Data Manipulation Language
– A data manipulation language (DML) controls
database operations, including storing, retrieving,
updating, and deleting data
• Schema
– The complete definition of a database, including
descriptions of all fields, tables, and relationships,
is called a schema
– You also can define one or more subschemas
12
DBMS Components
• Physical Data Repository
– The data dictionary is transformed into a physical
data repository, which also contains the schema
and subschemas
– The physical repository might be centralized, or
distributed at several locations
– ODBC – open database connectivity
– JDBC – Java database connectivity
13
Web-Based Database Design
• Characteristics of Web-Based Design
14
Web-Based Database Design
• Internet Terminology
– Web browser
– Web page
– HTML (Hypertext Markup Language)
– Tags
– Web server
– Web site
15
Web-Based Database Design
• Internet Terminology
– Intranet
– Extranet
– Protocols
– Web-centric
– Clients
– Servers
16
Web-Based Database Design
• Connecting a Database to the Web
– Database must be connected to the Internet or
intranet
– Middleware
• Adobe ColdFusion
• Data Security
– Well-designed systems provide security at three
levels: the database itself, the Web server, and the
telecommunication links that connect the
components of the system
17
Data Design Terminology
• Definitions
–
–
–
–
Entity
Table or file
Field
Record
• Tuple
18
Data Design Terminology
• Key Fields
– Primary key
– Candidate key
– Foreign key
– Secondary key
19
Data Design Terminology
• Referential Integrity
– Validity checks can help
avoid data input errors
– In a relational database,
referential integrity
means that a foreign key
value cannot be entered
in one table unless it
matches an existing
primary key in another
table
– Orphan
20
Entity-Relationship Diagrams
• Drawing an ERD
– The first step is to list the
entities that you identified
during the fact-finding
process and to consider
the nature of the
relationships that link them
– A popular method is to
represent entities as
rectangles and
relationships as diamond
shapes
21
Entity-Relationship Diagrams
• Types of Relationships
– Three types of
relationships can exist
between entities
– One-to-one relationship
(1:1)
– One-to-many
relationship (1:M)
– Many-to-many
relationship (M:N)
22
Entity-Relationship Diagrams
• Cardinality
• Cardinality notation
• Crow’s foot notation
• Unified Modeling
Language (UML)
• Now that you understand
database elements and
their relationships, you
can start designing tables
23
Normalization
• Standard Notation Format
– Designing tables is easier if you use a standard
notation format to show a table’s structure, fields,
and primary key
– Example: NAME (FIELD 1, FIELD 2, FIELD 3)
24
Normalization
• Repeating Groups and Unnormalized Design
– Repeating groups
• Often occur in manual documents prepared by users
– Unnormalized
– Enclose the repeating group of fields within a
second set of parentheses
25
Normalization
• First Normal Form
– A table is in first normal form (1NF) if it does not
contain a repeating group
– To convert, you must expand the table’s primary
key to include the primary key of the repeating
group
26
Normalization
• Second Normal Form
– A table design is in second normal form (2NF) if it is in
1NF and if all fields that are not part of the primary
key are functionally dependent on the entire primary
key
– A standard process exists for converting a table from
1NF to 2NF
– The objective is to break the original table into two or
more new tables and reassign the fields so that each
nonkey field will depend on the entire primary key in
its table
27
Normalization
• Third Normal Form
– 3NF design avoids redundancy and data integrity
problems that still can exist in 2NF designs
– A table design is in third normal form (3NF) if it is
in 2NF and if no nonkey field is dependent on
another nonkey field
– To convert the table to 3NF, you must remove all
fields from the 2NF table that depend on another
nonkey field and place them in a new table that
uses the nonkey field as a primary key
28
Normalization
• A Normalization Example
29
Using Codes During Data Design
• Overview of Codes
– Because codes often are used to represent data,
you encounter them constantly in your everyday
life
– They save storage space and costs, reduce data
transmission time, and decrease data entry time
– Can reduce data input errors
30
Using Codes During Data Design
• Types of Codes
1.
2.
3.
4.
5.
6.
7.
Sequence codes
Block sequence codes
Alphabetic codes
Significant digit codes
Derivation codes
Cipher codes
Action codes
31
Using Codes During Data Design
• Developing a Code
1.
2.
3.
4.
5.
Keep codes concise
Allow for expansion
Keep codes stable
Make codes unique
Use sortable codes
32
Using Codes During Data Design
• Developing a Code
6.
7.
8.
9.
Avoid confusing codes
Make codes meaningful
Use a code for a single purpose
Keep codes consistent
33
Database Design: One Step At a
Time
1. Create an initial ERD
2. Next, create an ERD
3. Review all the data elements
4. Review the 3NF designs for all tables
5. Double-check all data dictionary entries
• After creating your final ERD and normalized
table designs, you can transform them into a
database
34
Database Models
• A Real-World Business
Example
– Imagine a company that
provides on-site service
for electronic
equipment, including
parts and labor
35
Database Models
• Working with a Relational Database
– To understand the power and flexibility of a
relational database, try the following exercise
– Suppose you work in IT, and the sales team needs
answers to three specific questions
– The data might be stored physically in seven tables
36
Data Storage and Access
• Data storage and access
involve strategic
business tools
• Strategic tools for data
storage and access
– Data warehouse –
dimensions
– Data mart
– Data Mining
37
Data Storage and Access
• Logical and Physical Storage
– Logical storage
• Characters
• Data element or data item
• Logical record
– Physical storage
• Physical record or block
• Buffer
• Blocking factor
38
Data Storage and Access
• Data Coding and
Storage
–
–
–
–
Binary digits
Bit
Byte
EBCDIC, ASCII, and
Binary
– Unicode
39
Data Storage and Access
• Data Coding and Storage
– Storing dates
• Y2K Issue
• Most date formats now are based on the model
established by the International Organization for
Standardization (ISO)
• Absolute date
40
Data Control
•
•
•
•
•
•
•
•
User ID
Password
Permissions
Encryption
Backup
Recovery procedures
Audit log files
Audit fields
41
Chapter Summary
• Files and tables contain data about people,
places, things, or events that affect the
information system
• DBMS designs are more powerful and flexible
than traditional file-oriented systems
42
Chapter Summary
• An entity-relationship (ERD) is a graphic
representation of all system entities and the
relationships among them
• A code is a set of letters or numbers used to
represent data in a system
• The most common database models are
relational and object-oriented
43
Chapter Summary
• Logical storage is information seen through a
user’s eyes, regardless of how or where that
information actually is organized or stored
• Physical storage is hardware-related and involves
reading and writing blocks of binary data to
physical media
• File and database control measures include
limiting access to the data, data encryption,
backup/recovery procedures, audit-trail files, and
internal audit fields
44
Chapter Summary
• Chapter 9 complete
45
Download