Normalization Notes
Normalization Notes
Normalization Notes
The insertion anomaly: Occurs when extra data beyond the desired data must be added to the
database. For example, to insert a course (CourseNo), it is necessary to know a student
(StdSSN) and offering (OfferNo) because the combination of StdSSN and OfferNo is the
primary key. Remember that a row cannot exist with NULL values for part of its primary key.
The update anomaly: Occurs when it is necessary to change multiple rows to modify ONLY a
single fact. For example, if we change the StdClass of student S1 (JUN), two rows, row 1
and 2 must be changed. If S1 was enrolled in 10 classes, 10 rows must be changed.
The deletion anomaly: Occurs whenever deleting a row inadvertently causes other data to be
deleted. For example, if we delete the enrollment (EnrGrade) of S2 in O3 (third row), we lose
the information about offering O3 and course C3 because these values are unique to the table
(cell). Furthermore O3 is a primary key.
RECAP
Problems associated with data redundancy are illustrated by comparing the Staff and Branch
tables with the StaffBranch table. Tables that have redundant data may have problems called
update anomalies, which are classified as insertion, deletion, or modification anomalies. See the
following Figure for an example of a table with redundant data called StaffBranch. There are
two main types of insertion anomalies, which we illustrate using this table.
Insertion anomalies
1. To insert the details of a new member of staff (staffNo, name, position and salary)
located at a given branch into the StaffBranch table, we must also enter the correct details
for that branch (branchNo, branchAddress and telNo). For example, to insert the details
of a new member of staff at branch B002, we must enter the correct details of branch B002 so
that the branch details are consistent with values for branch B002 in other records of the
StaffBranch table. The data shown in the StaffBranch table is also shown in the Staff
and Branch tables. These tables do have redundant data and do not suffer from this potential
inconsistency, because for each staff member we only enter the appropriate branch number into
the Staff table. In addition, the details of branch B002 are recorded only once in the database
as a single record in the Branch table.
2. To insert details of a new branch that currently has no members of staff into the StaffBranch
table, it’s necessary to enter NULLs into the staff-related columns, such as staffNo. However,
as staffNo is the primary key for the StaffBranch table, attempting to enter nulls for
staffNo violates entity integrity, and is not allowed. The design of the tables shown in Staff
and Branch avoids this problem because new branch details are entered into the Branch table
separately from the staff details. The details of staff ultimately located at a new branch can be
entered into the Staff table at a later date.
Deletion anomalies
If we delete a record from the StaffBranch table that represents the last member of staff located
at a branch, the details about that branch are also lost from the database. For example, if we delete
the record for staff Art Peters (S0415) from the StaffBranch table, the details relating to
branch B003 are lost from the database. The design of the tables that separate the Staff and
Branch table avoids this problem because branch records are stored separately from staff records
and only the column branchNo relates the two tables. If we delete the record for staff Art
Peters (S0415) from the Staff table, the details on branch B003 in the Branch table remain
unaffected.
Modification anomalies
If we want to change the value of one of the columns of a particular branch in the StaffBranch
table, for example the telephone number for branch B001, we must update the records of all staff
located at that branch (row 1 and 2). If this modification is not carried out on all the appropriate
records of the StaffBranch table, the database will become inconsistent. In this example, branch
B001 would have different telephone numbers in different staff records.
The above examples illustrate that the Staff and Branch tables have more desirable properties
than the StaffBranch table.
StaffBranch Table
StaffBranch table has redundant data; the details of a branch are repeated for every
member of staff for example row 1 and 2, row 3 and 4 on branchNo, branchAddress and
telNo.
In contrast, the branch information appears only once for each branch in the Branch table and
only the branch number (branchNo) is repeated in the Staff table, to represent where each
member of staff is located.
Let take a look at another example.
AIRCRAFT_1 Table
If we use the AIRCRAFT_1 table as shown in the above Figure, a change in hourly rental rates
(AC_RENT_CHG) for the Cessna 172 Skyhawk must be made four times; if we forget to
change just one of those rates, we have a data integrity problem.
How much better it would be to have critical data in only one place. Then, if a change must be
made, it need be made only once.
In contrast, table structures are good when they preclude the possibility of producing
uncontrolled data redundancies.
We can produce such a happy circumstance by splitting the AIRCRAFT_1 table as shown in the
following two Figures, connecting the two resulting tables through the AIRCRAFT_1 table's
foreign key MOD_CODE.
Note that a rental rate change need be made in only one place, a description is given in only one
place, and so on. No more data update and delete anomalies and no more data integrity
problems. The relational schema in the following Figure shows how the two tables are related.
The First normal form (1NF)
A table in which the intersection of every column and record contains only one value. It
prohibits nesting or repeating groups in table. The intersection must be atomic.
For example the telNos column contains multiple values.
2NF ONLY applies to tables with composite primary keys (more than one primary key).
A table that is in 1NF and in which the values of each non-primary-key column can be worked
out from the values in ALL the columns that make up the primary key.
A table is in 2NF if each non-key (non primary and/or candidate keys) column depends on
ALL candidate keys, NOT on a subset of ANY candidate key.
The 2NF violation occurs when Functional Dependency (FD) in which part of key (instead of
the whole keys) determines a non-key. An FD containing a single column Left Hand Side (LHS)
cannot violate 2NF.
For example, TempStaffAllocation table in the following Figure is in 2NF because
branchAddress can depend on branchNo only not both of staffNo AND branchNo
(staffNo & branchNo are candidate keys and at the same time can be primary keys and at
the same time is composite key because more than one primary keys). Another one is the values
in name and position columns can depend on (can stand on it own) the staffNo ONLY
not both of staffNo and branchNo. What we want is the hoursperWeek column, which
depends on both staffNo and branchNo. In another word we must avoid the partial
dependencies on the candidate keys.
The particular relationships that we show between the columns of a table are more formally
referred to as functional dependencies (FDs). FD describes the relationship between columns in
a table.
Another example, consider a table with columns A and B, where B is functionally dependent on
A (denoted A → B). If we know the value of A, we find only one value of B in all the records
that has this value of A, at any moment in time.
FD Definition
X → Y.
X (functionally) determines Y or Y is functionally dependent on X.
X: left-hand-side (LHS) or determinant.
For each X value, there is at most one Y value.
Similar to candidate keys.
Formal definition of 2NF is a table that is in 1NF and every non-primary-key column is fully
functional dependent on the primary key.
Full functional dependency indicates that if A and B are columns of a table, B is fully
dependent on A if B is functionally dependent on A but not on any proper subset of A.
Consider the following examples.
Identifying Functional Dependencies
child, FK for
1-M Faculty
table is here
Teaches ►
Faculty Offering
FacNo 1..1 1..* OfferNo
LHS RHS
FD in which the LHS is not a PK or candidate key can also be difficult to identify.
These FDs are especially important to identify after converting an ERD to a table design.
You should carefully look for FDs in which the LHS is not a candidate key or primary key.
You should also consider FDs in tables with a combined PK or candidate key in which the
LHS is part of a key, but not the entire key. The NFs these kinds of FDs can lead to
modification anomalies.
Another important consideration in asserting FD is the minimalism of LHS. It is important to
distinguish when one column alone is the determinant versus a combination of column.
An FD in which the LHS contains more than one column usually represents an M-N
relationship. For example, the statement “The order quantity is collected for each product
purchased in an order” translates to the FD OrdNo, ProdNo → OrdQty.
Order quantity depends on the combination of order number and product number, not just
one of these columns.
Part of the confusion about the minimalism of the LHS is due to the meaning of columns in
the left-hand versus right-hand side of a dependency. The minimal determinant means the
determinant (column(s) appearing on the LHS of FD) must not contain extra columns and
this minimalism requirement is similar to the minimalism requirement for candidate keys.
For example, to record that student Social Security Number determines city and class, you
can write either:
If you assume that the email address is also unique for each student, then you can write:
This is because these FDs imply that the combination of StdSSN and Email is the
determinant. Thus you should write FDs so that the LHS does not contain unneeded
columns.
The prohibition against unneeded columns for determinants is the same as the prohibition
against unneeded columns in candidate keys. Both determinants and candidate keys must be
minimal.
A FD cannot be proven to exist by examining the rows of a table. However you can falsify a
FD (i.e. prove that a FD does not exist) by examining the contents of a table.
For example, in the university database, we can conclude that StdClass does not
determine StdCity because there are two rows with the same value for StdClass but a
different value for StdCity.
Thus, it is sometimes helpful to examine sample rows in a table to eliminate potential
functional dependencies.
There are several commercial database design tools that automate the process of eliminating
dependencies through examination of sample rows. Ultimately, the database designer must
make the final decision about FDs that exist in a table.
A table that is in 1NF and 2NF and in which all non-primary-key column can be worked out
from only the primary key column(s) and no other columns.
At this level, the combined definition of 2NF and 3NF is a table is in 3NF if each non-key
column depends on all candidate keys, whole candidate keys and nothing but candidate keys.
For 2NF we should remove partial dependency and for 3NF we should remove transitive
dependency.
For example the StaffBranch table is not in 3NF.
The formal definition of 3NF is a table that is in 1NF and 2NF and in which no non-primary-
key column is transitively dependent on the primary key.
For example, consider a table with A, B, and C. If B is functional dependent on A (A → B)
and C is functional dependent on B (B → C), then C is transitively dependent on A via B
(provided that A is not functionally dependent on B or C).
If a transitive dependency exists on the primary key, the table is not in 3NF.
Reviews Questions & Answers
1. Describe the characteristics of a table that violates first normal form (1NF) and then describe
how such a table is converted to 1NF.
The rule for first normal form (1NF) is a table in which the intersection of every column and
record contains only one value. In other words a table that contains more than one atomic value
in the intersection of one or more column for one or more records is not in 1NF. The non 1NF
table can be converted to 1NF by restructuring original table by removing the column with the
multi-values along with a copy of the primary key to create a new table. The advantage of this
approach is that the resultant tables may be in normal forms later that 1NF.
2. What is the minimal normal form that a relation must satisfy? Provide a definition for this
normal form.
Only first normal form (1NF) is critical in creating appropriate tables for relational databases.
All the subsequent normal forms are optional. However, to avoid the update anomalies, it’s
normally recommended that you proceed to third normal form (3NF).
First normal form (1NF) is a table in which the intersection of every column and record contains
only one value.
3. Describe an approach to converting a first normal form (1NF) table to second normal form
(2NF) table(s).
Second normal form applies only to tables with composite primary keys, that is, tables with a
primary key composed of two or more columns. A 1NF table with a single column primary key
is automatically in at least 2NF.
A second normal form (2NF) is a table that is already in 1NF and in which the values in each
non-primary-key column can be worked out from the values in all the columns that makes up the
primary key.
A table in 1NF can be converted into 2NF by removing the columns that can be worked out from
only part of the primary key. These columns are placed in a new table along with a copy of the
part of the primary key that they can be worked out from.
Second normal form (2NF) is a table that is already in 1NF and in which the values in each non-
primary-key column can only be worked out from the values in all the columns that make up the
primary key.
5. Describe what is meant by full functional dependency and describe how this type of dependency
relates to 2NF. Provide an example to illustrate your answer.
The formal definition of second normal form (2NF) is a table that is in first normal form and
every non-primary-key column is fully functionally dependent on the primary key. Full
functional dependency indicates that if A and B are columns of a table, B is fully functionally
dependent on A, if B is not dependent on any subset of A. If B is dependent on a subset of A,
this is referred to as a partial dependency. If a partial dependency exists on the primary key, the
table is not in 2NF. The partial dependency must be removed for a table to achieve 2NF.
Third normal form (3NF) is a table that is already in 1NF and 2NF, and in which the values in
all non-primary-key columns can be worked out from only the primary key (or candidate key)
column(s) and no other columns.
7. Describe what is meant by transitive dependency and describe how this type of dependency
relates to 3NF. Provide an example to illustrate your answer.
The formal definition for third normal form (3NF) is a table that is in first and second normal
forms and in which no non-primary-key column is transitively dependent on the primary key.
Transitive dependency is a type of functional dependency that occurs when a particular type of
relationship holds between columns of a table. For example, consider a table with columns A, B,
and C. If B is functionally dependent on A (A → B) and C is functionally dependent on B (B →
C), then C is transitively dependent on A via B (provided that A is not functionally dependent on
B or C). If a transitive dependency exists on the primary key, the table is not in 3NF. The
transitive dependency must be removed for a table to achieve 3NF.
8. Examine the table shown below.
Answer:
Branch
branchNo branchAddress telNos
More than
B001 8 Jefferson Way, Portland, OR 97201 503-555-3618, 503-555-2727, 503-555-6534 one value, so
not in 1NF
B002 City Center Plaza, Seattle, WA 98122 206-555-6756, 206-555-8836
Branch BranchTelephone
branchNo branchAddress branchNo telNo
B001 8 Jefferson Way, Portland, OR 97201 B001 503-555-3618
B002 206-555-8836
B003 212-371-3000
B004 206-555-4112
Becomes Becomes
foreign key primary key
(Note: There is an alternative approach to altering the original Branch table – columns can be
added to the original Branch table to hold the individual values for each telephone number, e.g.
telNo1, telNo2 and telNo3.)
9. Examine the table shown below.
S4555 B002 City Center Plaza, Seattle, WA 98122 Ellen Layman Assistant 16
S4612 B002 City Center Plaza, Seattle, WA 98122 Dave Sinclair Assistant 14
Answer:
TempStaffAllocation
staffNo branchNo branchAddress name position hoursPerWeek
S4555 B002 City Center Plaza, Seattle, WA 98122 Ellen Layman Assistant 16
S4612 B002 City Center Plaza, Seattle, WA 98122 Dave Sinclair Assistant 14
Values in hoursPerWeek
column can only be worked
out from staffNo and
branchNo
Composite
primary key
TempStaffAllocation
staffNo branchNo branchAddress name position hoursPerWeek
S4555 B002 City Center Plaza, Seattle, WA 98122 Ellen Layman Assistant 16
S4612 B002 City Center Plaza, Seattle, WA 98122 Dave Sinclair Assistant 14
Branch TempStaff
branchNo branchAddress staffNo name position
B002 City Center Plaza, Seattle, WA 98122 S4555 Ellen Layman Assistant
Becomes Becomes
primary key primary key
TempStaffAllocation
staffNo branchNo hoursPerWeek
S4555 B002 16
S4555 B004 9
S4612 B002 14
S4612 B004 10
Becomes Becomes
foreign key foreign key
Composite
primary key
10. Examine the table shown below.
B002 City Center Plaza, Seattle, WA 98122 206-555-6756 S0010 Mary Martinez
B003 14 – 8th Avenue, New York, NY 10012 212-371-3000 S0145 Art Peters
Answer:
BranchManager
branchNo branchAddress telNo mgrStaffNo name
B002 City Center Plaza, Seattle, WA 98122 206-555-6756 S0010 Mary Martinez
B003 14 – 8th Avenue, New York, NY 10012 212-371-3000 S0145 Art Peters
Primary
key
B002 City Center Plaza, Seattle, WA 98122 206-555-6756 S0010 Mary Martinez
B003 14 – 8th Avenue, New York, NY 10012 212-371-3000 S0415 Art Peters
Remove name
Take copy of column to new
Primary key
mgrStaffNo table
BranchManger table
is renamed Branch
Branch ManagerStaff
branchNo branchAddress telNo mgrStaffNo mgrStaffNo name
B001 8 Jefferson Way, Portland, OR 97201 503-555-3618 S1500 S1500 Tom Daniels
B002 City Center Plaza, Seattle, WA 98122 206-555-6756 S0010 S0010 Mary Martinez
B003 14 – 8th Avenue, New York, NY 10012 212-371-3000 S0415 S0415 Art Peters
B004 16 – 14th Avenue, Seattle, WA 98128 206-555-3131 S2250 S2250 Sally Stern
Primary key
Becomes Primary key
foreign key
1. What is normalization?
Normalization is the process for assigning attributes to entities. Properly executed, the
normalization process eliminates uncontrolled data redundancies, thus eliminating the data
anomalies and the data integrity problems that are produced by such redundancies.
Normalization does not eliminate data redundancy; instead, it produces the carefully
controlled redundancy that lets us properly link database tables.
A table is in Boyce-Codd Normal Form (BCNF) when it is in 3NF and every determinant in the
table is a candidate key. For example, if the table is in 3NF and it contains a nonprime attribute
that determines a prime attribute, the BCNF requirements are not met. This description clearly
yields the following conclusions:
If a table is in 3NF and it contains only one candidate key, 3NF and BCNF are equivalent.
BCNF can be violated only if the table contains more than one candidate key. Putting it
another way, there is no way that the BCNF requirement can be violated if there is only one
candidate key.
6. Given the dependency diagram shown in the following Figure, answer the following questions.