Presenter: Rueen-Fang Wang, Ph.D., P.E. Fix Implementation Deficiencies of Database Structure Presenter: Rueen-Fang Wang, Ph.D., P.E. 1.

Slides:



Advertisements
Similar presentations
Chapter Eight: Database Redesign Database Processing: Fundamentals, Design, and Implementation.
Advertisements

THE RELATIONAL DATABASE MODEL & THE DATABASE DEVELOPMENT PROCESS Fact of the Week: According to a Gartner study in ‘06, Microsoft SQL server had the highest.
© 2002 by Prentice Hall 1 David M. Kroenke Database Processing Eighth Edition Chapter 10 Database Application Design.
Getting Started (Excerpts) Chapter One DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
RELATIONSHIP  THE WAY TABLES ARE RELATED  A TABLE MUST PARTICIPATE IN AT LEAST ONE RELATIONSHIP  IN A BINARY RELATIONSHIP TWO ENTITIES PARTICIPATE 
Database Design Concepts INFO1408 Term 2 week 1 Data validation and Referential integrity.
Transforming Data Models into Database Designs
Database Constraints. Database constraints are restrictions on the contents of the database or on database operations Database constraints provide a way.
Relational Database Need to Knows. What is a database? Data - is just a pile of numbers or stats. A business "organises" the data to be meaningful and.
© Pearson Education Limited, Chapter 2 The Relational Model Transparencies.
Module Title? DBMS E-R Model to Relational Model.
Primary & Foreign Keys. PK & FK 1.Primary key is required 2.The PK must be unique 3.If the primary key from one table is related to a field in another.
Database Management System Lecture 6 The Relational Database Model – Keys, Integrity Rules.
Learningcomputer.com SQL Server 2008 – Entity Relationships in a Database.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
IE 423 – Design of Decision Support Systems Database development – Relationships and Queries.
Normalization (Codd, 1972) Practical Information For Real World Database Design.
Office Management Tools II Ms Saima Gul.  When you create your tables, you should assign each table a primary key—one or more fields whose contents are.
Data Integrity An empty database is a correct database.
Dr. Chen, Business Database Systems JustLee DataBase Referential Integrity Jason C. H. Chen, Ph.D. Professor of MIS School of Business Administration Gonzaga.
Introduction to Database using Microsoft Access 2013 Part 7 November 19, 2014.
Database Application Design and Data Integrity AIMS 3710 R. Nakatsu.
1 Database Systems Introduction to Microsoft Access Part 2.
INFORMATION TECHNOLOGY DATABASE MANAGEMENT. Adding a new field 1Right click the table name and select design view 2Type the field information at the end.
Chapter 10 Designing the Files and Databases. SAD/CHAPTER 102 Learning Objectives Discuss the conversion from a logical data model to a physical database.
Relational Theory and Design
Chapter 9 Constraints. Chapter Objectives  Explain the purpose of constraints in a table  Distinguish among PRIMARY KEY, FOREIGN KEY, UNIQUE, CHECK,
Oracle 11g: SQL Chapter 4 Constraints.
Chapter 4 Constraints Oracle 10g: SQL. Oracle 10g: SQL 2 Objectives Explain the purpose of constraints in a table Distinguish among PRIMARY KEY, FOREIGN.
Chapter 9 Logical Database Design : Mapping ER Model To Tables.
INTRODUCTION lecture1 1. Data base concept Data is a meaningless static value. What does 3421 means? Information is the data you process in a manner that.
Maintaining Business Rules With Function Hierarchy Diagrammer.
The Relational Database Model & The Database Development Process
(Winter 2016) Instructor: Craig Duckett Lecture 15: Thursday, February 25 th Visual Studio Walk-Through 1.
Consolidation Objectives of the Lecture : To review a given design of a relational database. To amplify the design by adding Integrity Constraints. To.
Description and exemplification use of a Data Dictionary. A data dictionary is a catalogue of all data items in a system. The data dictionary stores details.
IMS 4212: Data Modeling—Business Rules 1 Dr. Lawrence West, Management Dept., University of Central Florida Business Rules—Topics Intro.
Chapter 3: Relational Databases
DATA MODELING AND DATABASE DESIGN DATA MODELING AND DATABASE DESIGN Part 2.
1 CS 430 Database Theory Winter 2005 Lecture 7: Designing a Database Logical Level.
Level 1-2 Trigger Data Base development Current status and overview Myron Campbell, Alexei Varganov, Stephen Miller University of Michigan August 17, 2000.
Logical Database Design and Relational Data Model Muhammad Nasir
CH 10 DB Application Design n 10.1 Functions n 10.2 Case Application n 10.3 Creating, Reading, Updating, Deleting View n 10.4 Form Design n 10.5 Report.
IT 5433 LM3 Relational Data Model. Learning Objectives: List the 5 properties of relations List the properties of a candidate key, primary key and foreign.
AOIT Database Design Unit 3, Lesson 9 Data Integrity Copyright © 2009–2011 National Academy Foundation. All rights reserved.
Database Constraints ICT 011. Database Constraints Database constraints are restrictions on the contents of the database or on database operations Database.
Getting started with Accurately Storing Data
Tables & Relationships
View Integration and Implementation Compromises
and Defining Table Relationships
Database Keys and Constraints
CSIS 115 Database Design and Applications for Business
CIS 155 Table Relationship
Introduction to MS Access: creating tables, keys, and relationships
Lecture # 13 (After 1st Exam)
Rules in active databases and integrity constraints
Database Relationships
Referential Integrity
Introduction lecture1.
Introduction to Database Management System
Normalization Referential Integrity
IST 318 Database Administration
Referential Integrity
CHAPTER 4: LOGICAL DATABASE DESIGN AND THE RELATIONAL MODEL
SQL DATA CONSTRAINTS.
Database solutions Chosen aspects of the relational model Marzena Nowakowska Faculty of Management and Computer Modelling Kielce University of Technology.
logical design for relational database
Understand the purpose of normalisation in terms of reducing duplication of data  Understand the purpose of Primary and Secondary Keys in a Database  Learning.
Integrity Constraints
Presentation transcript:

Presenter: Rueen-Fang Wang, Ph.D., P.E. Fix Implementation Deficiencies of Database Structure Presenter: Rueen-Fang Wang, Ph.D., P.E. 1

2 Topics   Purpose of this task   Deficiencies identified   Steps to resolve deficiencies   Current status   Remaining tasks 2

3   To address issues discussed in the Panel’s subcommittee presentation (June 2007 ): Enforce meaningful referential integrity Enforce meaningful data uniqueness Purpose

4 Deficiencies Identified in the Initial Implementation   Related to referential integrity: Arc relationship Logical deletion List Item reference   Related to meaningful uniqueness Database Uniqueness rules

5 Identified Deficiency 1 – Arc Implementation DeficiencyScale of Problem Arc Usage Rules have not been enforced during the initial implementation => allowing incorrect references between tables 5 (<2%) rule violations out of 261 arc usage rules, involving approximately 15,000 (<0.1%) records out of 17,000,000 Referential integrity of arc relationship has not been enforced during the initial implementation => allowing creation of orphan records About 480,000 (~1.5%) orphan records exist via arc implementation out of 32,000,000

6 Identified Deficiency 2 – DELETED_DATETIME column DeficiencyScale of Problem Application performed incomplete logical deletion of data records by setting DELETED_DATETIME in the parent records only => bypassing FK check and allowing orphan records to be created at logical level More than 300,000 (~4%) orphan records exist out of 69,000,000

7 Identified Deficiency 3 – List Item Implementation DeficiencyScale of Problem List Item Usage Rules have not been enforced during the initial implementation => allowing creation of data records with incorrect lookup values (i.e. Party record refers to Place Type, etc.) 5 (~2%) rule violations out of 234 list item usage rules, involving approximately 26,000 (<0.05%) records out of 52,000,000

8 Identified Deficiency 4 – Meaningful Data Uniqueness DeficiencyScale of Problem Meaningful Data Uniqueness Rules have not been enforced for many tables in the initial implementation => allowing creation of duplicate data records Approximately 114 (80%) tables out of 142 tables being used do not contain rules to enforce meaningful uniqueness

9   Review and develop adequate database rules as necessary   Identify existing problematic data and the associated causes   Develop solutions to clean up the data and fix application   Develop and impose DB constraints and triggers to enforce database rules Steps to Resolve Deficiencies

10 Current Status ArcDeleted Date time List ItemMeaningful Uniqueness Develop Rules completed as of 9/30/07 completed as of 8/27/07 completed as of 8/31/07 to be completed by 3/31/08 Identify Problem completed as of 10/11/07 completed as of 9/20/07 completed as of 9/13/07 begin in Feb, 2008 Enforce Rules completed as of 12/31/07 to be completed by 3/31/08 begin in Feb, 2008 Fix App & Clean Data to be completed by 6/30/08 begin in Feb, 2008

11 Remaining Tasks Arc Fix application and clean up existing data Deleted Date time Clean up existing data marked as deleted, including linked child records List ItemCleanup 113 existing data records that violate a specific list item usage rule Meaningful Uniqueness Implement uniqueness rules for each table (including fixing application, clean up data, and impose rules)

12 Questions?