0% found this document useful (0 votes)
5 views2 pages

4) Distributed Database Administrator

The document outlines the responsibilities of a Database Administrator (DBA), focusing on database control through authentication, access rights, and integrity constraints. It details the processes for authenticating users, assigning access rights via roles, and enforcing integrity constraints such as data type, entity, and referential integrity. Examples of SQL commands illustrate how to implement these controls within a database system.

Uploaded by

sharmasudip010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views2 pages

4) Distributed Database Administrator

The document outlines the responsibilities of a Database Administrator (DBA), focusing on database control through authentication, access rights, and integrity constraints. It details the processes for authenticating users, assigning access rights via roles, and enforcing integrity constraints such as data type, entity, and referential integrity. Examples of SQL commands illustrate how to implement these controls within a database system.

Uploaded by

sharmasudip010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Database Administrator(DBA)

Database control is one of the primary tasks of the database administrator (DBA).
The three dimensions of database control are −
• Authentication
• Access rights
• Integrity constraints

Authentication
In a distributed database system, authentication is the process through which only legitimate(legal) users
can gain access to the data resources.

Authentication can be enforced in two levels −


Controlling Access to Client Computer − At this level, user access is restricted while login to the client
computer that provides user-interface to the database server. The most common method is a username/
password combination.
Controlling Access to the Database Software − At this level, the database administrator assigns some
credentials( testimonials or certi ed documents showing that a person is entitled to credit )to the user.
The user gains access to the database using these credentials. One of the methods is to create a login
account within the database server.

Access Rights
• A user’s access rights refers to the privileges that the user is given regarding DBMS operations such as
the rights to create a table, drop a table, add/delete/update tuples in a table or query upon the table.
• In distributed environments, since there are large number of tables and yet larger number of users, it is
not feasible to assign individual access rights to users. So, DDBMS de nes certain roles. A role is a
construct with certain privileges within a database system.
For example, the following SQL statements create a role "Accountant" and then assigns this
role to user "ABC"

Semantic Integrity Control


Semantic integrity control de nes and enforces the integrity(The state of being whole & undivided)
constraints(Integrity constraints ensure that the data insertion, updating, and other processes have to be
performed in such a way that data integrity is not a ected). of the database system.
The integrity constraints are as follows −
• Data type integrity constraint
• Entity integrity constraint
• Referential integrity constraint
Data Type Integrity Constraint
A data type constraint restricts the range of values and the type of operations that can be applied to the
eld with the speci ed data type.
For example,
let us consider that a table "HOSTEL" has three elds - the hostel number, hostel name and capacity.
The hostel number should start with capital letter "H" and cannot be NULL, and the capacity should not
be more than 150.
The following SQL command can be used for data de nition −
fi
fi
fi
fi
fi
ff
fi
fi
Entity Integrity Control
• Entity integrity control enforces the rules so that each tuple can be uniquely identi ed from other tuples.
For this a primary key is de ned.
• A primary key is a set of minimal elds that can uniquely identify a tuple.
• Entity integrity constraint states that no two tuples in a table can have identical values for primary keys
and that no eld which is a part of the primary key can have NULL value.

For example, in the above hostel table, the hostel number can be assigned as the primary key
through the following SQL statement (ignoring the checks) −

Referential Integrity Constraint


• Referential integrity constraint lays down the rules of foreign keys.
• A foreign key is a eld in a data table that is the primary key of a related table.

For example,
let us consider a student table where a student may opt to live in a hostel. To include this, the primary key
of hostel table should be included as a foreign key in the student table.
The following SQL statement incorporates this −
fi
fi
fi
fi
fi

You might also like