SlideShare a Scribd company logo
1 of 35
RDBMS
CHAPTER - 2
RELATIONAL MODEL
E.F.Codd Rules
 Information Rule
All information in the database should be
represented in one and only one way - as values
in a table.

Guaranteed Access Rule
Each and every datum (atomic value) is
guaranteed to be logically accessible by
resorting to a combination of table name, primary
key value and column name.
E.F.Codd Rules
 Systematic Treatment of Null Values
Null values (distinct from empty character
string or a string of blank characters and
distinct from zero or any other number) are
supported in the fully relational DBMS for
representing missing information in a
systematic way, independent of data type.
E.F.Codd Rules
 Dynamic On-line Catalog Based on the
Relational Model
The database description is represented at
the logical level in the same way as
ordinary data, so authorized users can
apply the same relational language to its
interrogation as they apply to regular data.

E.F.Codd Rules
 Comprehensive Data Sublanguage Rule
A relational system may support several languages and
various modes of terminal use. However, there must be
at least one language whose statements are expressible,
per some well-defined syntax, as character strings and
whose ability to support all of the following is
comprehensible:
 data definition
 view definition
 data manipulation (interactive and by program)
 integrity constraints
 authorization
 transaction boundaries (begin, commit, and rollback).

E.F.Codd Rules
 View Updating Rule
All views that are theoretically updateable are
also updateable by the system.
 High-level Insert, Update, and Delete
The capability of handling a base relation or a
derived relation as a single operand applies nor
only to the retrieval of data but also to the
insertion, update, and deletion of data.
E.F.Codd Rules
 Physical Data Independence
Application programs and terminal activities
remain logically unimpaired whenever any
changes are made in either storage
representation or access methods.
 Logical Data Independence
Application programs and terminal activities
remain logically unimpaired when information
preserving changes of any kind that theoretically
permit unimpairment are made to the base
tables.
E.F.Codd Rules
 Integrity Independence
Integrity constraints specific to a particular
relational database must be definable in the
relational data sublanguage and storable in the
catalog, not in the application programs.
 Distribution Independence
The data manipulation sublanguage of a
relational DBMS must enable application
programs and terminal activities to remain
logically unimpaired whether and whenever data
are physically centralized or distributed.
E.F.Codd Rules
 Nonsubversion Rule
If a relational system has or supports a low-
level (single-record-at-a-time) language, that
low-level language cannot be used to
subvert or bypass the integrity rules or
constraints expressed in the higher-level
(multiple-records-at-a-time) relational
language.

Keys
 Super Key
 Candidate Key
 Primary Key
 Foreign Key
Types Of Integrity Constraints
 Domain Integrity Constraint
 Entity Integrity Constraint
 Referential Integrity Constraint
Foreign Key
 On Delete Cascade
 On Update Cascade
 Eg:- references rollno
 on delete cascade
 on update cascade
Database Security
1. Data Tempering
Eaves Dropping
Falsifying user Identities
 Pretend to be some one else
Password threats
Threats
 Unauthorized access
to table and columns
Columns
Unauthorized Access to rows
Rows
Threats
 Lack of Accountability
Data Security Requirements
 Confidentiality
 Privacy of communication
 Secure storage of sensitive data
 Authenticated users
 Granular access control
 Integrity
 Availability
Data Authorization Matrix
Subject Object Action Constraint
A student Insert None
Ram Emp Update,
Delete
Salary Not
Null
Relational Algebra
Roll No Name Address
1 Minu Pune
2 Meera Mumbai
3 Sayali Pune
4 Pravin Gujrat
Sport_id Roll no
11 1
12 3
Relational Algebra
 Select Operation ( σ )
 TO select a particular row
 σ
(roll no = 1 (student))
1 Minu Pune
Project Operation (π)
 π
(rollno,name (Student))
Roll No Name
1 Minu
2 Meera
3 Sayali
4 Pravin
Union operator (U)
 π
(rollno (Student))
U
 π
(rollno (Sports))
Minus operator (-)
 π
(rollno (Student))
-
 π
(rollno (Sports))
Cartesian Operator (X)
 Student X sports
Student.rolln
o
Student.n
ame
Student.a
ddress
Sports.Roll No Sport.sport_id
1 Minu Pune 1 11
2 Meera Mumbai 1 11
3 Sayali Pune 1 11
4 Pravin Gujrat 1 11
1 Minu Pune 3 12
2 Meera Mumbai 3 12
Rename Operation(ρ)
 π
(s.rollno,s.name,s.address,s1,rollno,s1.sport_id (ρ s
Student X ρ s1 sports))
Other Relational Operators
 n (Intersection operator)
 π
(rollno (Student))
n
 π
(rollno (Sports))
Natural Join ⋈
 π
(s.rollno,s.name,s.address,s1,rollno,s1.sport_id (ρ s
Student ⋈ ρ s1 sports))
Assignment Operator
 Temp1 π
r -s( R)
Extended Relational operators
 Generalized Projection
 π
(marks1+marks2 (Student))
Marks1 Marks 2
10 11
12 11
Output----------- Marks1+marks2
----------------------
21
23
Aggregation Function(G)
 G sum(marks)(Student)
 G sum(marks),avg(marks),min(marks),max(marks)(Student)
Outer Join
 Full Outer Join
 Left Outer Join
 Right Outer Join

More Related Content

Similar to Chapter2.ppt

Dbms Concepts
Dbms ConceptsDbms Concepts
Dbms Concepts
adukkas
 

Similar to Chapter2.ppt (20)

RDBMS
RDBMSRDBMS
RDBMS
 
Rdbms
RdbmsRdbms
Rdbms
 
unit 1.pptx
unit 1.pptxunit 1.pptx
unit 1.pptx
 
Database Systems - introduction
Database Systems - introductionDatabase Systems - introduction
Database Systems - introduction
 
RDBMS_Concept.ppt
RDBMS_Concept.pptRDBMS_Concept.ppt
RDBMS_Concept.ppt
 
Sql interview questions and answers
Sql interview questions and  answersSql interview questions and  answers
Sql interview questions and answers
 
Unit01 dbms
Unit01 dbmsUnit01 dbms
Unit01 dbms
 
Database Concepts 101
Database Concepts 101Database Concepts 101
Database Concepts 101
 
Dbms 1
Dbms 1Dbms 1
Dbms 1
 
A relational model of data for large shared data banks
A relational model of data for large shared data banksA relational model of data for large shared data banks
A relational model of data for large shared data banks
 
Unit1
Unit1Unit1
Unit1
 
DBMS - Introduction
DBMS - IntroductionDBMS - Introduction
DBMS - Introduction
 
Database Modelling Concepts - Chapter 1
Database Modelling Concepts - Chapter 1Database Modelling Concepts - Chapter 1
Database Modelling Concepts - Chapter 1
 
Ch09
Ch09Ch09
Ch09
 
COMPUTERS Database
COMPUTERS Database COMPUTERS Database
COMPUTERS Database
 
Dbms Concepts
Dbms ConceptsDbms Concepts
Dbms Concepts
 
Dbms Basics
Dbms BasicsDbms Basics
Dbms Basics
 
Codds rules & keys
Codds rules & keysCodds rules & keys
Codds rules & keys
 
Introduction to DBMS and SQL Overview
Introduction to DBMS and SQL OverviewIntroduction to DBMS and SQL Overview
Introduction to DBMS and SQL Overview
 
Dbms relational model
Dbms relational modelDbms relational model
Dbms relational model
 

More from SanaMateen7 (9)

java introduction features and propertie
java introduction features and propertiejava introduction features and propertie
java introduction features and propertie
 
tcpip protocol compuetr networks notes.ppt
tcpip protocol compuetr networks notes.ppttcpip protocol compuetr networks notes.ppt
tcpip protocol compuetr networks notes.ppt
 
08-Switching.ppt
08-Switching.ppt08-Switching.ppt
08-Switching.ppt
 
circuitswitch.ppt
circuitswitch.pptcircuitswitch.ppt
circuitswitch.ppt
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
artificial-neural-networks-rev.ppt
artificial-neural-networks-rev.pptartificial-neural-networks-rev.ppt
artificial-neural-networks-rev.ppt
 
IOT ARDUINO UNO.pptx
IOT ARDUINO UNO.pptxIOT ARDUINO UNO.pptx
IOT ARDUINO UNO.pptx
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 
IOT W1.pptx
IOT W1.pptxIOT W1.pptx
IOT W1.pptx
 

Recently uploaded

Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 

Recently uploaded (20)

Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 

Chapter2.ppt

  • 3. E.F.Codd Rules  Information Rule All information in the database should be represented in one and only one way - as values in a table.  Guaranteed Access Rule Each and every datum (atomic value) is guaranteed to be logically accessible by resorting to a combination of table name, primary key value and column name.
  • 4. E.F.Codd Rules  Systematic Treatment of Null Values Null values (distinct from empty character string or a string of blank characters and distinct from zero or any other number) are supported in the fully relational DBMS for representing missing information in a systematic way, independent of data type.
  • 5. E.F.Codd Rules  Dynamic On-line Catalog Based on the Relational Model The database description is represented at the logical level in the same way as ordinary data, so authorized users can apply the same relational language to its interrogation as they apply to regular data. 
  • 6. E.F.Codd Rules  Comprehensive Data Sublanguage Rule A relational system may support several languages and various modes of terminal use. However, there must be at least one language whose statements are expressible, per some well-defined syntax, as character strings and whose ability to support all of the following is comprehensible:  data definition  view definition  data manipulation (interactive and by program)  integrity constraints  authorization  transaction boundaries (begin, commit, and rollback). 
  • 7. E.F.Codd Rules  View Updating Rule All views that are theoretically updateable are also updateable by the system.  High-level Insert, Update, and Delete The capability of handling a base relation or a derived relation as a single operand applies nor only to the retrieval of data but also to the insertion, update, and deletion of data.
  • 8. E.F.Codd Rules  Physical Data Independence Application programs and terminal activities remain logically unimpaired whenever any changes are made in either storage representation or access methods.  Logical Data Independence Application programs and terminal activities remain logically unimpaired when information preserving changes of any kind that theoretically permit unimpairment are made to the base tables.
  • 9. E.F.Codd Rules  Integrity Independence Integrity constraints specific to a particular relational database must be definable in the relational data sublanguage and storable in the catalog, not in the application programs.  Distribution Independence The data manipulation sublanguage of a relational DBMS must enable application programs and terminal activities to remain logically unimpaired whether and whenever data are physically centralized or distributed.
  • 10. E.F.Codd Rules  Nonsubversion Rule If a relational system has or supports a low- level (single-record-at-a-time) language, that low-level language cannot be used to subvert or bypass the integrity rules or constraints expressed in the higher-level (multiple-records-at-a-time) relational language. 
  • 11. Keys  Super Key  Candidate Key  Primary Key  Foreign Key
  • 12. Types Of Integrity Constraints  Domain Integrity Constraint  Entity Integrity Constraint  Referential Integrity Constraint
  • 13. Foreign Key  On Delete Cascade  On Update Cascade  Eg:- references rollno  on delete cascade  on update cascade
  • 16. Falsifying user Identities  Pretend to be some one else
  • 18. Threats  Unauthorized access to table and columns Columns
  • 20. Threats  Lack of Accountability
  • 21. Data Security Requirements  Confidentiality  Privacy of communication  Secure storage of sensitive data  Authenticated users  Granular access control  Integrity  Availability
  • 22. Data Authorization Matrix Subject Object Action Constraint A student Insert None Ram Emp Update, Delete Salary Not Null
  • 23. Relational Algebra Roll No Name Address 1 Minu Pune 2 Meera Mumbai 3 Sayali Pune 4 Pravin Gujrat Sport_id Roll no 11 1 12 3
  • 24. Relational Algebra  Select Operation ( σ )  TO select a particular row  σ (roll no = 1 (student)) 1 Minu Pune
  • 25. Project Operation (π)  π (rollno,name (Student)) Roll No Name 1 Minu 2 Meera 3 Sayali 4 Pravin
  • 26. Union operator (U)  π (rollno (Student)) U  π (rollno (Sports))
  • 27. Minus operator (-)  π (rollno (Student)) -  π (rollno (Sports))
  • 28. Cartesian Operator (X)  Student X sports Student.rolln o Student.n ame Student.a ddress Sports.Roll No Sport.sport_id 1 Minu Pune 1 11 2 Meera Mumbai 1 11 3 Sayali Pune 1 11 4 Pravin Gujrat 1 11 1 Minu Pune 3 12 2 Meera Mumbai 3 12
  • 30. Other Relational Operators  n (Intersection operator)  π (rollno (Student)) n  π (rollno (Sports))
  • 31. Natural Join ⋈  π (s.rollno,s.name,s.address,s1,rollno,s1.sport_id (ρ s Student ⋈ ρ s1 sports))
  • 33. Extended Relational operators  Generalized Projection  π (marks1+marks2 (Student)) Marks1 Marks 2 10 11 12 11 Output----------- Marks1+marks2 ---------------------- 21 23
  • 34. Aggregation Function(G)  G sum(marks)(Student)  G sum(marks),avg(marks),min(marks),max(marks)(Student)
  • 35. Outer Join  Full Outer Join  Left Outer Join  Right Outer Join