Gio Wiederhold: Database Design, 3rd Edition, Prologue
© 1995, 1997
(Copyright Notice) by
Gio
Wiederhold, re-assigned by McGraw-Hill 7 April 1995 from their 1988 copyright.
Prologue, Draft 1, 9 May 1995, latest update June 1997.
Database Design, second edition, on-line.
An archival copy of Database Design, second edition, has been prepared
for the ACM SIGMOD archive. To access it, go to
Database Design, Second Edition, 1983, recreated 2000 for
on-line dissemination.
The figures for that edition are also
available individually.
Welcome to Database Design, third edition, on-line.
This book is an experiment in Electronic Publishing.
Feel free to read the on-line version, but please consider the
dissemination policy below.
In order to publicize the possibility of new means for the dissemination
of intellectual material, I will report on annual basis the income derived
from this experiment on this web page.
Conversion Plan
I plan to make the book available in various phases.
The index below will indicate what forms are available.
- Place the chapters of Database Design, 2nd edition, on-line in
PDF form. Drawn figures are available
separately.
Minor extensions will be made at that time. (done)
- Scan those figures which are not in postscript and convert them to
gif ot jpeg form (done).
- provide links to those figures. (done)
will be made.
- Augment the 2nd edition material with Chapters on topics as Object
Generation,
Temporal databases, Uncertainty processing, etc.
- Convert the Chapters to HTML format.
Chapters with many formulas will require the use of a competent HTML browser,
that supports TeX formulas, as IBM's techplorer.
- Provide entry points to all sections.
- Create linkages among the chapters.
- Encourage the creation of annotations by others, both private and public.
News
No news yet
INDEX to Gio Wiederhold: DATABASE DESIGN, 3rd Edition
Chapter 1: INTRODUCTION Postscript draft On-line
Figure list, Chapter 1.
- 1-0 Introduction
- 1-1 Databases
- 1-2 Database Management
- 1-3 Database Design and Models
- 1-4 Size ???
- 1-4 Databases and the World
- 1-5 A Hierarchical View of Data
- 1-6 Binding << move to Chapter 2?? >>
- 1-7 Applications
- Background and References
Figure list, Chapter 1.
- =1-1: Files;
- =1-2: Computations on a Database;
- =1-3: A Hierarchical View of Data;
- =1-4: Current Practice;
- =1-5: Descriptions;
- =1-6: Binding;
- =1-7: Classification of Operating Systems;
- =1-8: Applications;
- =1-9: Review;
- Background and References;
- Exercises.
Chapter 2: HARDWARE AND ITS PARAMETERS
- postscript draft on-line -- figures separate
Figure list, Chapter 2.
- =2-1: Basic Hardware Choices;
- =2-2: Basic Hardware Parameters;
- =2-3: Blocks and Buffers;
- =2-4: Storage Architecture;
- Background and References;
- Exercises.
PART I: FILE STRUCTURES AND DESIGN
Chapter 3: BASIC FILE SYSTEM ORGANIZATION --
Sections on-line in postscript, no figures yet
Figure list, Chapter 3.
Sections 3.2 and 3.3; and 3.4 and 3.5 are combined.
- =3-0: Introduction;
- =3-1: The Pile;
- =3-2: The Sequential File
;
- =3-3: The Indexed-Sequential File;
- =3-4: The Indexed File
;
- =3-5: The Direct File;
- =3-6: The Multi-ring File;
- Background and References;
- Exercises.
Figure list, Chapter 4.
- =4-1: Simple Files;
- =4-2: Multilevel Index Structures;
- =4-3: An Implementation of an Indexed-Sequential File;
- =4-4: Tree-Structured Files;
- =4-5: Hierarchically Structured Data;
- =4-6: Methods Based on Direct Access;
- =4-7: Options of the Complex Ring Organization;
- =4-8: Files Using Virtual Storage;
- =4-9: Phantom Files;
- Background and References;
- Exercises.
Figure list, Chapter 5.
- =5-1: The Estimation of System Usage;
- =5-2: Analysis of System Benefits;
- =5-3: Database Storage Requirements;
- =5-4: Access Load and Capability of a File System;
- =5-5: Cost-Benefit Comparison;
- Background and References;
- Exercises.
Figure list, Chapter 6.
- =6-1: Statistical Techniques;
- =6-2: Simulation;
- =6-3: Queues and Scheduling Techniques;
- =6-4: Operations Research in Database Design;
- =6-5: Storage Allocation;
- Background and References;
- Exercises.
PART II: DATABASE STRUCTURES AND DESIGN
Figure list, Chapter 7.
- =7--1 Models.
- =7--2 Entities and Relationships (was View models)
- =7--3 Relations as a Model for Entities
- =7--4 Dependencies
- =7--5 The Structure of Relations
- =7--6 Domains
- =7--7 Summary of Components of Relations
- Background and References;
- Exercises.
Figure list, Chapter 7 (old).
- =7-0: Structure Definition;
- =7-1: View Models;
- =7-2: Semantics of Relations;
- =7-3: Building Blocks for Models;
- =7-4: Operations on Relations;
- =7-5: The Design of a Database Model;
- Background and References;
- Exercises.
Figure list, Chapter 8.
- =8-1: Defining the Elements for a Database;
- =8-2: The Schema and Its Use;
- =8-3: Defining the Structure of a Database;
- =8-4: Manipulation of the Schema;
- =8-5: Subschemas;
- =8-6: Structure, Schema, and Usage;
- Background and References;
- Exercises.
Figure list, Chapter 9.
- =9-1: Issues in Database Implementation;
- =9-2: Relational Calculus Implementation;
- =9-3: Relational Algebra Implementation;
- =9-4: Hierarchical Databases;
- =9-5: Databases with Network Capability;
- =9-6: Interlinked Hierarchies;
- =9-7: Advances in Implementation;
- Background and References;
- Exercises.
Figure list, Chapter 10.
- =10-1: Data Constellations;
- =10-2: Categories of Information Retrieval;
- =10-3: Query Formulation;
- =10-4: Dynamics of Information-retrieval Systems;
- Background and References;
- Exercise.
- Background and References;
- Exercise.
Much material from old Chapter 9.
- Background and References;
- Exercise.
Much material from old Chapters 8 and 11
- Background and References;
- Exercise.
Some material from chapter 3.
- Background and References;
- Exercise.
- INTRODUCTION
- DESIGN and PERFORMANCE
- MAPPING to FILES
- Transaction performance, was DCID 15-1
- Single node performance, was DCID 15-2
- Database machine performance, was DCID 15-3
- DISTRIBUTION
- 15-4 Distributed data base performance
- Background and References;
- Exercise.
PART III: SECURITY AND OPERATION
Figure list, Chapter 11.
- =11-1: Reliability;
- =11-2: Redundancy;
- =11-3: Transaction Reliability;
- =11-4: Activity Logging;
- =11-5: A Scenario for Recovery;
- Background and References;
- Exercises.
Figure list, Chapter 12.
- =12-1: Components of the Protection Problem;
- =12-2: The Accessor;
- =12-3: Types of Data Access;
- =12-4: The Objects to be Locked;
- =12-5: Envelope of Protection;
- =12-6: Access Key Organization;
- =12-7: Cryptography;
- =12-8: Anonymity and Pollution;
- Background and References;
- Exercises.
Figure list, Chapter 13.
- =13-1: Locking;
- =13-2: Hibernation and Deadlock;
- =13-3: Maintenance of Integrity;
- Background and References;
- Exercises.
Figure list, Chapter 14.
- =14-1: Representation of Knowledge;
- =14-2: Machine Representation;
- =14-3: Compression of Data;
- Background and References;
- Exercises.
Figure list, Chapter 15.
- =15-1: Development of the Database;
- =15-2: Maintenance of a Database;
- =15-3: The Database Administrator;
- Background and References.
PART IV: ADVANCED TOPICS
- Mathematical Symbols
- Programming and Syntax Symbols
- Variables for Performance Formulas
To become an active index
END