620 likes | 782 Vues
Physical Database Design. University of California, Berkeley School of Information IS 257: Database Management. Lecture Outline. Review Normalization Physical Database Design Access Methods. Lecture Outline. Review Normalization Physical Database Design Access Methods.
E N D
Physical Database Design University of California, Berkeley School of Information IS 257: Database Management
Lecture Outline • Review • Normalization • Physical Database Design • Access Methods
Lecture Outline • Review • Normalization • Physical Database Design • Access Methods
Database Design Process Application 1 Application 2 Application 3 Application 4 External Model External Model External Model External Model Application 1 Conceptual requirements Application 2 Conceptual requirements Conceptual Model Logical Model Internal Model Application 3 Conceptual requirements Application 4 Conceptual requirements
Normalization • Normalization theory is based on the observation that relations with certain properties are more effective in inserting, updating and deleting data than other sets of relations containing the same data • Normalization is a multi-step process beginning with an “unnormalized” relation • Hospital example from Atre, S. Data Base: Structured Techniques for Design, Performance, and Management.
Normal Forms • First Normal Form (1NF) • Second Normal Form (2NF) • Third Normal Form (3NF) • Boyce-Codd Normal Form (BCNF) • Fourth Normal Form (4NF) • Fifth Normal Form (5NF)
Normalization Unnormalized Relations First normal form Functional dependencyof nonkey attributes on the primary key - Atomic values only Second normal form No transitive dependency between nonkey attributes Third normal form Boyce- Codd and Higher Full Functional dependencyof nonkey attributes on the primary key All determinants are candidate keys - Single multivalued dependency
Unnormalized Relations • First step in normalization is to convert the data into a two-dimensional table • In unnormalized relations data can repeat within a column
First Normal Form • To move to First Normal Form a relation must contain only atomic values at each row and column. • No repeating groups • A column or set of columns is called a Candidate Key when its values can uniquely identify the row in the relation.
Second Normal Form • A relation is said to be in Second Normal Form when every nonkey attribute is fully functionally dependent on the primary key. • That is, every nonkey attribute needs the full primary key for unique identification
Third Normal Form • A relation is said to be in Third Normal Form if there is no transitive functional dependency between nonkey attributes • When one nonkey attribute can be determined with one or more nonkey attributes there is said to be a transitive functional dependency. • The side effect column in the Surgery table is determined by the drug administered • Side effect is transitively functionally dependent on drug so Surgery is not 3NF
Boyce-Codd Normal Form • Most 3NF relations are also BCNF relations. • A 3NF relation is NOT in BCNF if: • Candidate keys in the relation are composite keys (they are not single attributes) • There is more than one candidate key in the relation, and • The keys are not disjoint, that is, some attributes in the keys are common
Fourth Normal Form • Any relation is in Fourth Normal Form if it is BCNF and any multivalued dependencies are trivial • Eliminate non-trivial multivalued dependencies by projecting into simpler tables
Fifth Normal Form • A relation is in 5NF if every join dependency in the relation is implied by the keys of the relation • Implies that relations that have been decomposed in previous NF can be recombined via natural joins to recreate the original relation.
Normalization • Normalization is performed to reduce or eliminate Insertion, Deletion or Update anomalies. • However, a completely normalized database may not be the most efficient or effective implementation. • “Denormalization” is sometimes used to improve efficiency.
Denormalization • Usually driven by the need to improve query speed • Query speed is improved at the expense of more complex or problematic DML (Data manipulation language) for updates, deletions and insertions.
Downward Denormalization Before: After: Customer ID Address Name Telephone Order Order No Date Taken Date Dispatched Date Invoiced Cust ID Order Order No Date Taken Date Dispatched Date Invoiced Cust ID Cust Name Customer ID Address Name Telephone
Upward Denormalization Order Order No Date Taken Date Dispatched Date Invoiced Cust ID Cust Name Order Price Order Item Order No Item No Item Price Num Ordered Order Order No Date Taken Date Dispatched Date Invoiced Cust ID Cust Name Order Item Order No Item No Item Price Num Ordered
Using RDBMS to help normalize • Example database: Cookie • Database of books, libraries, publisher and holding information for a shared (union) catalog
How to Normalize? • Currently no way to have multiple authors for a given book, and there is duplicate data spread over the BIBFILE table • Can we use the DBMS to help us normalize? • Access example…
Lecture Outline • Review • Normalization • Using Relational DBs in normalization • Physical Database Design • Access Methods
Database Design Process Application 1 Application 2 Application 3 Application 4 External Model External Model External Model External Model Application 1 Conceptual requirements Application 2 Conceptual requirements Conceptual Model Logical Model Internal Model Application 3 Conceptual requirements Application 4 Conceptual requirements PhysicalDesign
Physical Database Design • Many physical database design decisions are implicit in the technology adopted • Also, organizations may have standards or an “information architecture” that specifies operating systems, DBMS, and data access languages -- thus constraining the range of possible physical implementations. • We will be concerned with some of the possible physical implementation issues
Physical Database Design • The primary goal of physical database design is data processing efficiency • We will concentrate on choices often available to optimize performance of database services • Physical Database Design requires information gathered during earlier stages of the design process
Physical Design Information • Information needed for physical file and database design includes: • Normalized relations plus size estimates for them • Definitions of each attribute • Descriptions of where and when data are used • entered, retrieved, deleted, updated, and how often • Expectations and requirements for response time, and data security, backup, recovery, retention and integrity • Descriptions of the technologies used to implement the database
Physical Design Decisions • There are several critical decisions that will affect the integrity and performance of the system • Storage Format • Physical record composition • Data arrangement • Indexes • Query optimization and performance tuning
Storage Format • Choosing the storage format of each field (attribute). The DBMS provides some set of data types that can be used for the physical storage of fields in the database • Data Type (format) is chosen to minimize storage space and maximize data integrity
Objectives of data type selection • Minimize storage space • Represent all possible values • Improve data integrity • Support all data manipulations • The correct data type should, in minimal space, represent every possible value (but eliminate illegal values) for the associated attribute and can support the required data manipulations (e.g. numerical or string operations)
Access Data Types • Numeric (1, 2, 4, 8 bytes, fixed or float) • Text (255 max) • Memo (64000 max) • Date/Time (8 bytes) • Currency (8 bytes, 15 digits + 4 digits decimal) • Autonumber (4 bytes) • Yes/No (1 bit) • OLE (limited only by disk space) • Hyperlinks (up to 64000 chars)
Access Numeric types • Byte • Stores numbers from 0 to 255 (no fractions). 1 byte • Integer • Stores numbers from –32,768 to 32,767 (no fractions) 2 bytes • Long Integer (Default) • Stores numbers from –2,147,483,648 to 2,147,483,647 (no fractions). 4 bytes • Single • Stores numbers from -3.402823E38 to –1.401298E–45 for negative values and from 1.401298E–45 to 3.402823E38 for positive values. 4 bytes • Double • Stores numbers from –1.79769313486231E308 to –4.94065645841247E–324 for negative values and from 1.79769313486231E308 to 4.94065645841247E–324 for positive values. 15 8 bytes • Replication ID • Globally unique identifier (GUID) N/A 16 bytes
Controlling Data Integrity • Default values • Range control • Null value control • Referential integrity (next time) • Handling missing data
Designing Physical Records • A physical record is a group of fields stored in adjacent memory locations and retrieved together as a unit • Fixed Length and variable fields
Designing Physical/Internal Model • Overview • terminology • Access methods
Physical Design DBMS External Model Internal Model Access Methods • Internal Model/Physical Model User request Interface 1 Interface 2 Operating System Access Methods Interface 3 Data Base
Physical Design • Interface 1: User request to the DBMS. The user presents a query, the DBMS determines which physical DBs are needed to resolve the query • Interface 2: The DBMS uses an internal model access method to access the data stored in a logical database. • Interface 3: The internal model access methods and OS access methods access the physical records of the database.
Physical File Design • A Physical file is a portion of secondary storage (disk space) allocated for the purpose of storing physical records • Pointers - a field of data that can be used to locate a related field or record of data • Access Methods - An operating system algorithm for storing and locating data in secondary storage • Pages - The amount of data read or written in one disk input or output operation
Internal Model Access Methods • Many types of access methods: • Physical Sequential • Indexed Sequential • Indexed Random • Inverted • Direct • Hashed • Differences in • Access Efficiency • Storage Efficiency
Physical Sequential • Key values of the physical records are in logical sequence • Main use is for “dump” and “restore” • Access method may be used for storage as well as retrieval • Storage Efficiency is near 100% • Access Efficiency is poor (unless fixed size physical records)
Indexed Sequential • Key values of the physical records are in logical sequence • Access method may be used for storage and retrieval • Index of key values is maintained with entries for the highest key values per block(s) • Access Efficiency depends on the levels of index, storage allocated for index, number of database records, and amount of overflow • Storage Efficiency depends on size of index and volatility of database
Index Sequential Data File Block 1 Block 2 Block 3 Adams Becker Dumpling Actual Value Address Block Number Dumpling Harty Texaci ... 1 2 3 … Getta Harty Mobile Sunoci Texaci