Information Engineering Dr B. Mills. ERD – Entity Relation Diagramming  In a well-designed relational database, each table represents an entity. In the.

Slides:



Advertisements
Similar presentations
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Advertisements

OSI Model OSI MODEL.
CompTIA Network+ Chapter 2
Review of Chapters 12, 13 & 14 Transport Layer Session Layer Presentation Layer.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Protocols and the TCP/IP Suite
OSI Model.
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
COMPUTER NETWORKS.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
THE OSI REFERENCE MODEL Open Systems Interconnection Reference Model.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
OSI Reference Model & Layered Communication Sritrusta Sukaridhoto.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Introduction to Computer Networks Introduction to Computer Networks.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
THE OSI REFERENCE MODEL Open Systems Interconnection (OSI) International Organization for Standardization( ISO)
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Database Concepts Advanced. Flat-File vs Relational DB Flat File Database A flat file database is a database designed around a single table. The flat.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
The OSI Model.
Protocols Rules governing the communication process, the language of the deal between the devices, must reflect Layers protocols define format, order of.
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
An Introduction to Networking
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Network Models.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
N ETWORKING Standards and Protocols. S TANDARDS AND P ROTOCOLS The OSI Model.
Data Communication Network Models
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
Networking Using the OSI Model.
OSI LAYERS.
Computer Communication Architecture
Chapter 5: Making Networks Work
The OSI Model and the TCP/IP Protocol Suite
ISO/OSI Model and Collision Domain
Layered Architectures
The OSI Model and the TCP/IP Protocol Suite
Layered Task, OSI Model, TCP/IP Model
Protocols and the TCP/IP Suite
Chapter 3: Open Systems Interconnection (OSI) Model
OSI Model OSI MODEL.
Protocols and the TCP/IP Suite
The OSI Model and the TCP/IP Protocol Suite
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Unit – III Network Essentials
Presentation transcript:

Information Engineering Dr B. Mills

ERD – Entity Relation Diagramming  In a well-designed relational database, each table represents an entity. In the figure below there are 4 entities(tables): Customers, Line Items, Invoices, Products. First we must understand entities

 Entities A database contains one or more related tables. Each table holds all of the information about an object, person or thing. Some examples of database tables might be:  - a customer table  - an appointments table  - an exam sessions table  - a teachers' names table  - a concert venue table ERD – Entity Relation Diagraming

Tables are entities  Each table is about an object, person, or thing.  Customers  Appointments  Books  Students  Products ERD – Entity Relation Diagraming

Entities have attributes  Entity = Customers.  CustomerID  FirstName  LastName  Data of Birth  Address ERD – Entity Relation Diagraming

Entities have attributes  Entity = Products.  ProductID  ProductName  Weight  Manufacturer  Warehouse ERD – Entity Relation Diagraming

Entities= Customer, Products, Orders  Customers  Products  Orders ERD – Entity Relation Diagraming

Entity Relationship Diagrams  These relationships can be shown in the form of a diagram.  This diagram is known as an 'entity relationship diagram', E-R diagram or ERD  As part of your exam, you will have to draw or interpret an E-R diagram. Before you can do this, you need to be able to interpret the relationships between the entities.   These relationships take the form of:  - one-to-one  - one-to-many  - many-to-many

One-to-One  A husband can only have one wife  A wife can only have one husband  this would be known as a 'one-to-one relationship'  This relationship in a diagram would look like this:

One-to-Many  A mother can have many children  A child can have only one mother  this would be known as a 'one-to-many relationship'  This diagram looks like this:

Many-to-Many  Think about a library  A book can be read by many people  People can read many books  this would be known as a 'many-to-many relationship‘  This relationship looks like this:

Modeling Your Data When designing a data model you should first determine the following: > The ‘Many’ side usually contains the foreign key > The ‘One’ side usually contains the primary key Before you design or set up a database, you should work out:  - the entities  - the attributes  - the entity relationships This process is called 'data modelling'

What The 7 – Layer OSI Model IS:. Defines a necessary elements for data communication between devices. Defines a communication architecture, for digital comuntication systems Visually and conceptually separates communication, network, and software functions

What The 7 – Layer OSI Model IS:. Defines a necessary elements for data communication between devices. Defines a communication architecture, for digital comuntication systems Visually and conceptually separates communication, network, and software functions

OSI Model Definition – 7 Layers  Layer 1 – Physical  Layer 2 – Data Link  Layer 3 – Network  Layer 4 – Transport  Layer 5 – Session  Layer 6 – Presentation  Layer 7 - Application  Please  Do  Not  Throw  Sausage  Pizza  Away

How data moves through the layers

Layer 7 - Application  Examples:  Internet Explorer, Safari, and other browsers  FTP  Mail  Many applications that run on your computer are NOT part of the Application layer. This means that the following are not part of layer 7 because they do not request network services:  Microsoft Word or Excel  Adobe Photoshop The Application layer provides services to the software through which the user requests network services. Physical – Data Link – Network – Transport – Session – Presentation - Application

Layer 6 - Presentation  For outgoing messages, it converts data into a generic format for network transmission; for incoming messages, it converts data from the generic network format to a format that the receiving application can understand  This layer is also responsible for certain protocol conversions, data encryption/decryption, or data compression/decompression  Examples:  MIDI  JPG, GIF, TIF  MPEG Manages data-format information for networked communications (the network’s translator) Physical – Data Link – Network – Transport – Session – Presentation - Application

Layer 5 - Session  Responsible for initiating, maintaining and terminating sessions  Responsible for security and access control to session information (via session participant identification)  Responsible for synchronization services, and for checkpoint services  Examples:  NFS  SQL  RPC The Session layer establishes, maintains, and manages the communication session between computers.

Layer 4 - Transport  Manages the transmission of data across a network  Manages the flow (flow control) of data between parties by segmenting long data streams into smaller data chunks (based on allowed “packet” size for a given transmission medium) (packet sequencing)  Provides acknowledgements of successful transmissions and requests retransmission for packets which arrive with errors (error detection and recovery)  Examples:  TCP  UDP The functions defined in this layer provide for the reliable transmission of data segments, as well as the disassembly and assembly of the data before and after transmission.

Layer 3 - Network  Handles addressing messages for delivery, as well as translating logical network addresses and names into their physical counterparts (Logical Addresses are managed by local network admins.)  Responsible for deciding how to route transmissions between computers  This layer also handles the decisions needed to get data from one point to the next point along a network path  This layer also handles packet switching and network congestion control  Example:  IP  Network routers The Network layer defines the processes used to route data across the network and the structure and use of logical addressing. Physical – Data Link – Network – Transport – Session – Presentation - Application

Layer 2 – Data Link  Handles special data frames (packets) between the Network layer and the Physical layer  At the sending end this layer handles conversion of data into raw formats that can be handled by the Physical Layer. At the receiving end, this layer packages raw data from the physical layer into data frames for delivery to the Network layer  The data link layer is often conceptually divided into two sub-layers: logical link control (LLC) and media access control (MAC).  Examples:  Network bridges  Ethernet  Wi-Fi Concerned with the linkages and mechanisms used to move data about the network and deals with the ways in which data is reliably transmitted. Physical – Data Link – Network – Transport – Session – Presentation - Application

Layer 1 - Physical  Converts bits into electronic signals for outgoing messages. Converts electronic signals into bits for incoming messages  This layer manages the interface between the computer and the network medium (coax, twisted pair, etc.)  This layer tells the driver software for the MAU (media attachment unit) (eg. network interface cards (NICs), modems) what needs to be sent across the medium  Examples:  Network hubs and repeaters  LAN and WAN topology This layer defines the electrical and physical specifications for the networking media that carry the data bits across a network. Physical – Data Link – Network – Transport – Session – Presentation - Application

Advanced Topic

Normalization  In the field of Relational Database design, normalization is a way of ensuring that a database structure is suitable for general- purpose querying and free of certain undesirable characteristics that could lead to a loss of Data integrity

Data Integrity  Refers to the validity of data  The assurance that data is accurate, correct and valid to the validity of data

What is Normalization?  Database normalization is the practice of optimizing table structures. Optimization is done by a complete investigation of the various pieces of data that will be stored within the database

An Introduction to Database Normalization - Preliminary Definitions Terminology in Normalization:  Entity: The word ‘entity’ as it relates to databases can simply be defined as the general name for the information that is to be stored within a single table.  Example: for storing information about the school’s students, then ‘student’ would be the entity.  The student entity would likely be composed of several pieces of information, for example:  student identification number, name, and address. These pieces of information are better known as attributes.

Relationship  Understanding the relationships between the data items forming the various entities and between the entities themselves forms the foundation of database normalization.  Remember, there are three types of data relationships that you should be aware of:  One-to-One  One-to-Many  Many-to-Many

Foreign Key and ERD  Foreign key: A foreign key forms the basis of a One-to-Many relationship between two tables. The foreign key can be found in the Many table, and points to the primary key found in the One table Entity-relationship diagram (ERD): An ERD is a graphical representation of the database structure. An ERD can be created using sophisticated software or drawn on a piece of paper from your pocket.

We want to eliminate data redundancy  Redundancy happens when the same data values are stored more than once in a table, or when the same values are stored in more than one table.  To prevent redundancy, normalization is done to improve performance when performing CRUD operations, especially searching for information  One of the biggest disadvantages of data redundancy is that it increases the size of the database unnecessarily. Also data redundancy might cause the same result to be returned as multiple search results when searching the database causing confusion and clutter in results.

Avoiding Redundancy

Analysis  This table maps (points to) various students to the classes found within their schedule.  Issues:  Assuming that the only intention of this table is to create student-class mappings, then there really is no need to repeatedly store the class time and professor ID.  if there are 30 students to a class, then the class information would be repeated 30 times over

Why avoid Redundancy?  Redundancy introduces the possibility for error.  the name of the class found in the final row in the table (Matj 148).  Given the name of the class found in the first row, chances are that Matj 148 should actually be Math 148!  While this error is easily identifiable when just four rows are present in the table, imagine finding this error within the rows representing the 60,000 enrolled students

Database Normalization - The Three Normal Forms The process towards database normalization progressing through a series of steps, typically known as Normal Forms.

First Normal Form (1NF)  Converting a database to the first normal form is rather simple.  The first rule calls for the elimination of repeating groups of data through the creation of separate tables of related data.

Breaking bigger tables down into several smaller tables. The first table contains solely student information (Student):

The second table contains solely class information (Class):

The third table contains solely professor information (Professor):

Second Normal form  Once you have separated the data into their respective tables, you can begin concentrating upon the rule of Second Normal Form-  -the elimination of redundant data. Referring back to the Class table, typical data stored within might look like:

Second Normal Form (2NF)

 While this table structure is certainly improved over the original, notice that there is still room for improvement.  In this case, the className attribute is being repeated. With 60,000 students stored in this table, performing an update to reflect a recent change in a course name could be somewhat of a problem. Therefore:  create a separate table that contains classID to className mappings (ClassIdentity):

Class Identity

The updated Class table would then be simply:

Third Normal Form (3NF)  For complete normalization of the school system database, the next step in the process is to satisfy the rule of the Third Normal Form.  This rule seeks to eliminate all attributes from a table that are not directly dependent upon the primary key. In the case of the Student table, the college and college Location attributes are less dependent upon the student ID than they are on the major attribute. Therefore, we’ll create a new table that relates the major, college and college Location information:

Third Normal Form

The revised Student table would then look like:

Some other Database Terms…  Data Mining  Data Matching  Distributed Databases  Boolean Operators  SQL Servers

Summary  Normalization is a systematic way of ensuring that a database structure is suitable for general-purpose querying and free of certain undesirable characteristics—insertion, update, and deletion anomalies—that could lead to a loss of data integrity.