DATABASDESIGN FÖR INGENJÖRER - 1DL124

Similar documents
DATABASE TECHNOLOGY - 1MB025 (also 1DL029, 1DL300+1DL400)

Domain Constraints Referential Integrity Assertions Triggers. Authorization Authorization in SQL

DATABASE DESIGN - 1DL400

DATABASE DESIGN - 1DL400

DATABASDESIGN FÖR INGENJÖRER - 1DL124

Chapter 6: Integrity and Security.! Domain Constraints! Referential Integrity! Assertions! Triggers! Security! Authorization! Authorization in SQL

DATABASE TECHNOLOGY - 1MB025

Database System Concepts

Comp 5311 Database Management Systems. 4b. Structured Query Language 3

DATABASE TECHNOLOGY - 1MB025

DATABASTEKNIK - 1DL116

Integrity and Security

SQL. Lecture 4 SQL. Basic Structure. The select Clause. The select Clause (Cont.) The select Clause (Cont.) Basic Structure.

Chapter 4: SQL. Basic Structure

Basic Structure Set Operations Aggregate Functions Null Values Nested Subqueries Derived Relations Views Modification of the Database Data Definition

Lecture 3 SQL. Shuigeng Zhou. September 23, 2008 School of Computer Science Fudan University

DATABASE DESIGN I - 1DL300

DATABASE TECHNOLOGY. Spring An introduction to database systems

Relational Algebra. Relational Algebra. 7/4/2017 Md. Golam Moazzam, Dept. of CSE, JU

The SQL database language Parts of the SQL language

Relational model continued. Understanding how to use the relational model. Summary of board example: with Copies as weak entity

DATABASDESIGN FÖR INGENJÖRER F

Database System Concepts"

Chapter 3: Relational Model

Chapter 3: SQL. Chapter 3: SQL

DATABASE TECHNOLOGY - 1DL124

Database System Concepts, 5th Ed.! Silberschatz, Korth and Sudarshan See for conditions on re-use "

Silberschatz, Korth and Sudarshan See for conditions on re-use

Chapter 3: SQL. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan See for conditions on re-use

CSCI 127 Introduction to Database Systems

ADVANCED DATABASES ; Spring 2015 Prof. Sang-goo Lee (11:00pm: Mon & Wed: Room ) Advanced DB Copyright by S.-g.

UNIT- II (Relational Data Model & Introduction to SQL)

CS352 - DATABASE SYSTEMS. To give you experience with developing a database to model a real domain

CS34800 Information Systems. The Relational Model Prof. Walid Aref 29 August, 2016

CSCC43H: Introduction to Databases. Lecture 4

Upon completion of this Unit, students will be introduced to the following

Database System Concepts, 5th Ed.! Silberschatz, Korth and Sudarshan See for conditions on re-use "

QQ Group

Constraints. Primary Key Foreign Key General table constraints Domain constraints Assertions Triggers. John Edgar 2

The Relational Model

Chapter A: Network Model

CS352 - DATABASE SYSTEMS

Database Systems SQL SL03

Basic Concepts. Chapter A: Network Model. Cont.) Data-Structure Diagrams (Cont( Data-Structure Diagrams. Basic Concepts

Database System Concepts, 5 th Ed.! Silberschatz, Korth and Sudarshan See for conditions on re-use "

Chapter 2: Relational Model

Database Systems SQL SL03

Views, assertions, and triggers

CONSTRAINTS AND UPDATES CHAPTER 3 (6/E) CHAPTER 5 (5/E)

Database System Concepts

Chapter 14 Query Optimization

Chapter 14 Query Optimization

Chapter 14 Query Optimization

SQL DATA DEFINITION LANGUAGE

A database can be modeled as: + a collection of entities, + a set of relationships among entities.

Where Are We? Next Few Lectures. Integrity Constraints Motivation. Constraints in E/R Diagrams. Keys in E/R Diagrams

SQL DATA DEFINITION LANGUAGE

SQL DATA DEFINITION LANGUAGE

CSIT5300: Advanced Database Systems

Simple SQL Queries (2)

CSIT5300: Advanced Database Systems

Note that alternative datatypes are possible. Other choices for not null attributes may be acceptable.

CS425 Midterm Exam Summer C 2012

Debapriyo Majumdar DBMS Fall 2016 Indian Statistical Institute Kolkata


DATABASE TECHNOLOGY. Spring An introduction to database systems

First lecture of this chapter is in slides (PPT file)

Chapter 1: Introduction

CS121 MIDTERM REVIEW. CS121: Relational Databases Fall 2017 Lecture 13

1. Considering functional dependency, one in which removal from some attributes must affect dependency is called

EGCI 321: Database Systems. Dr. Tanasanee Phienthrakul

Domain Constraints: Domain of possible values must be associated with every attribute. Domains could be specified as below:

DATABASE DESIGN I - 1DL300

The Relational Model. Chapter 3. Comp 521 Files and Databases Fall

User Interfaces and Tools. Web Interfaces to Database (Cont.) Web Interfaces to Databases. Client Side Scripting and Applets.

Chapter 6: Formal Relational Query Languages

Chapter 5: Other Relational Languages

CS W Introduction to Databases Spring Computer Science Department Columbia University

Intermediate SQL ( )

The Relational Model 2. Week 3

The Relational Model. Why Study the Relational Model? Relational Database: Definitions

Chapter 2: Entity-Relationship Model. Entity Sets. Entity Sets customer and loan. Attributes. Relationship Sets. A database can be modeled as:

Chapter 4: Intermediate SQL

SQL: Data Definition Language

Introduction to Relational Databases. Introduction to Relational Databases cont: Introduction to Relational Databases cont: Relational Data structure

Integrity Constraints (Reminder)

COSC344 Database Theory and Applications. σ a= c (P) Lecture 3 The Relational Data. Model. π A, COSC344 Lecture 3 1

Chapter 12: Query Processing

Relational Model. Topics. Relational Model. Why Study the Relational Model? Linda Wu (CMPT )

Comp 5311 Database Management Systems. 2. Relational Model and Algebra

Chapter 8 INTEGRITY 1

ITCS 3160 DATA BASE DESIGN AND IMPLEMENTATION

ADVANCED SQL DDL. CS121: Relational Databases Fall 2017 Lecture 10

; Spring 2008 Prof. Sang-goo Lee (14:30pm: Mon & Wed: Room ) ADVANCED DATABASES

CPS 510 Data Base I. Query: find all SNRs whose scodes are greater than some SNRs whose name is CB.

The Basic (Flat) Relational Model. Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

High Level Database Models

A database consists of several tables (relations) AccountNum

Chapter 5: Other Relational Languages.! Query-by-Example (QBE)! Datalog

DATABASE MANAGEMENT SYSTEMS UNIT II- RELATIONAL MODEL

Transcription:

1 DATABASDESIGN FÖR INGENJÖRER - 1DL124 Sommar 2005 En introduktionskurs i databassystem http://user.it.uu.se/~udbl/dbt-sommar05/ alt. http://www.it.uu.se/edu/course/homepage/dbdesign/st05/ Kjell Orsborn Uppsala Database Laboratory Department of Information Technology, Uppsala University, Uppsala, Sweden

2 Database Integrity Constraints (Elmasri/Navathe ch. 5.2 and 9.1) Kjell Orsborn Department of Information Technology Uppsala University, Uppsala, Sweden

3 Domain constraints Integrity constraints guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency. Domain constraints are the most elementary form of integrity constraint. They test values inserted in the database, and test queries to ensure that the comparisons make sense.

4 Domain constraints cont The check clause in SQL-92 permits domains to be restricted: Use check clause to ensure that an hourly-wage domain allows only values greater than a specified value. create domain hourly-wage numeric(5,2) constraint value-test check( value >= 4.00) The domain hourly-wage is declared to be a decimal number with 5 digits, 2 of which are after the decimal point The domain has a constraint that ensures that the hourly-wage is greater than 4.00. The clause constraint value-test is optional; useful to indicate which constraint an update violated.

5 Referential integrity Ensures that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation. Example: if Perryridge is a branch name appearing in one of the tuples in the account relation, then there exists a tuple in the branch relation for branch Perryridge. Formal definition Let r 1 (R 1 ) and r 2 (R 2 ) be relations with primary keys K 1 and K 2 respectively. The subset α of R 2 is a foreign key referencing K 1 in relation r 1, if for every t 2 in r 2 there must be a tuple t 1 in r 1 such that t 1 [K 1 ] = t2[α]. Referential integrity constraint: Π α (r 2 ) Π K (r 1 )

6 Referential integrity in the E-R model Consider relationship set R between entity sets E 1 and E 2. The relational schema for R includes the primary keys K 1 of E 1 and K 2 of E 2. Then K 1 and K 2 form foreign keys on the relational schemas for E 1 and E 2 respectively. Weak entity sets are also a source of referential integrity constraints. The relation schema for a weak entity set must include the primary key of the entity set on which it depends.

7 Database modification The following tests must be made in order to preserve the referential integrity constraint: Π α (r 2 ) Π K1 (r 1 ) Insert. If a tuple t 2 is inserted into r 2, the system must ensure that there is a tuple t 1 in r 1 such that t 1 [K 1 ] = t 2 [α]. That is t 2 [α] Π K1 (r 1 ) Delete. If a tuple t 1 is deleted from r 1, the system must compute the set of tuples in r 2 that reference t 1 : σ α = t1[k1] (r 2 ) If this set is not empty, either the delete command is rejected as an error, or the tuples that reference t 1 must themselves be deleted (cascading deletions are possible).

8 Database modification cont d Update. There are two cases: Case 1: If a tuple t 2 is updated in relation r 2 and the update modifies values for the foreign key α, then a test similar to the insert case is made. Let t 2 denote the new value of tuple t 2. The system must ensure that: t 2 [α] Π K1 (r 1 ) Case 2: If a tuple t 1 is updated in r 1, and the update modifies values for the primary key (K 1 ), then a test similar to the delete case is made. The system must compute σ α = t1[k1] (r 2 ) using the old value of t 1 (the value before the update is applied). If this set is not empty, the update may be rejected as an error, or the update may be cascaded to the tuples in the set (cascading update), or the tuples in the set may be deleted (cascading delete).

9 Referential integrity in SQL Primary and candidate keys and foreign keys can be specified as part of the SQL create table statement: The primary key clause of the create table statement includes a list of the attributes that comprise the primary key. The unique key clause of the create table statement includes a list of the attributes that comprise a candidate key. The foreign key clause of the create table statement includes both a list of the attributes that comprise the foreign key and the name of the relation referenced by the foreign key.

10 Referential integrity in SQL - example create table customer (customer-name char(20) not null, customer-street char(30), customer-city char(30), primary key (customer-name)) create table branch (branch-name char(15) not null, branch-city char(30), assets integer, primary key (branch-name))

11 Referential integrity in SQL - example cont d create table account (account-number char(10) not null, branch-name char(15), balance integer, primary key (account-number), foreign key (branch-name) references branch) create table depositor (customer-name char(20) not null, account-number char(10) not null, primary key (customer-name,account-number), foreign key (account-number) references account, foreign key (customer-name) references customer)

12 Cascading actions in SQL create table account... foreign key (branch-name) references branch on delete cascade on update cascade,...) If a tuple in branch is deleted (updated), there is a tuple in account that will also be deleted (updated), i.e. the delete (update) cascades.

13 Cascading actions in SQL cont d If there is a chain of foreign-key dependencies across multiple relations, with on delete cascade specified for each dependency, a deletion or update at one end of the chain can propagate across the entire chain. If a cascading update or delete causes a constraint violation that cannot be handled by a further cascading operation, the system aborts the transaction. As a result, all the changes caused by the transaction and its cascading actions are undone.

14 Assertions An assertion is a predicate expressing a condition that we wish the database always to satisfy. An assertion in SQL-92 takes the form: create assertion <assertion-name> check <predicate> When an modification (insert/delete/update)of the db is made, the system tests it for validity. This testing may introduce a significant amount of overhead; hence assertions should be used with great care.

15 Assertion example The sum of all loan amounts for each branch must be less than the sum of all account balances at the branch. create assertion sum-constraint check (not exists (select * from branch where (select sum( amount) from loan where loan.branch-name = branch.branch-name) >= (select sum( amount) from account where loan.branch-name = branch.branch-name)))

16 Another assertion example Every loan has at least one borrower who maintains an account with a minimum balance of $1000.00. create assertion balance-constraint check (not exists (select * from loan where not exists (select * from borrower, depositor, account where loan.loan-number = borrower.loan-number and borrower.customer-name = depositor.customer-name and depositor.account-number = account.account-number and account.balance >= 1000)))

17 Triggers A trigger is a statement that is executed automatically by the system as a side effect of a modification to the database. To design a trigger mechanism, we must: Specify the conditions under which the trigger is to be executed. Specify the actions to be taken when the trigger executes. The SQL-92 standard does not include triggers, but many implementations support triggers. SQL:99 has specified triggers.

18 Trigger example Suppose that instead of allowing negative account balances, the bank deals with overdrafts by setting the account balance to zero creating a loan in the amount of the overdraft giving this loan a loan number identical to the account number of the overdrawn account New values after an update are represented by the keyword new and old values by the keyword old. The condition for executing the trigger is a check to see if the balance after an update to the account relation (represented by new.balance) results in a negative balance.

19 Trigger example cont d create trigger overdraft for account before update as begin if (new.balance < 0) then end begin insert into loan values (branch-name, old.account-number, new.balance); insert into borrower (select customer-name, account-number from depositor where old.account-number = depositor.account-number); update account S set S.balance = 0 where S.account-number = old.account-number; end

20 Stored procedures A stored procedure makes it possible to store procedural code for applications in the database. A stored procedure can perfor complex operations and act as an interface to an application. Procedures are executed in the database and can more easily and efficiently retrieve data since they can include SQL queries directly. Stored procedures can perform certain error handling using exceptions (comp. exeptions i programming languages)

21 Stored procedure example The following procedure, SUB_TOT_BUDGET, takes a department number as its input parameter, and returns the total, average, minimum, and maximum budgets of departments with the specified HEAD_DEPT. It computes total, average, smallest, and largest department budget. CREATE PROCEDURE SUB_TOT_BUDGET (head_dept CHAR(25)) RETURNS (tot_budget DECIMAL(12, 2), avg_budget DECIMAL(12, 2), min_budget DECIMAL(12, 2), max_budget DECIMAL(12, 2)) AS BEGIN SELECT SUM(BUDGET), AVG(BUDGET), MIN(BUDGET), MAX(BUDGET) FROM DEPARTMENT WHERE HEAD_DEPT = :head_dept INTO :tot_budget, :avg_budget, :min_budget, :max_budget; END; END The procedure is executed by: EXECUTE PROCEDURE SUB_TOT_BUDGET( Sales and Marketing );

22 Stored proc. vs. triggers Triggers are used when one should monitor updates of tables where one do not who, or how, the table will be updated. Should be used with carefulness!!! Stored procedures are used to update tables where one knows that the table update will allways be done through the procedure instead of through a direct update. Stored procedures are precompiled and can be used as efficient views (views are normally not optimized before they are refererenced), but are usually used for updates.