Data Modeling and Database Design 2nd Edition Narayan S. Umanath Download
Data Modeling and Database Design 2nd Edition Narayan S. Umanath Download
https://ebookname.com/product/data-modeling-and-database-
design-2nd-edition-narayan-s-umanath/
Get the full ebook with Bonus Features for a Better Reading Experience on ebookname.com
Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...
https://ebookname.com/product/data-analysis-for-database-design-
third-edition-david-howe/
https://ebookname.com/product/relational-database-design-clearly-
explained-2nd-edition-edition-jan-lharington/
https://ebookname.com/product/micromechatronics-modeling-
analysis-and-design-with-matlab-2nd-ed-edition-giurgiutiu/
https://ebookname.com/product/multiplatform-e-learning-systems-
and-technologies-mobile-devices-for-ubiquitous-ict-based-
education-1st-edition-tiong-t-goh/
Synthetic Vaccines Volume 114 1st Edition Cornelius
Melief
https://ebookname.com/product/synthetic-vaccines-volume-114-1st-
edition-cornelius-melief/
https://ebookname.com/product/guide-to-astm-test-methods-for-the-
analysis-of-petroleum-products-and-lubricants-2nd-edition-
mnl-44-r-a-nadkarni/
https://ebookname.com/product/european-territorial-
governance-1st-edition-w-zonneveld/
https://ebookname.com/product/from-scribal-error-to-rewriting-
how-ancient-texts-could-and-could-not-be-changed-de-septuaginta-
investigationes-dsi-12-1-ed-edition-anneli-aejmelaeus-editor/
https://ebookname.com/product/egypt-s-liberal-
experiment-1922-1936-afaf-lutfi-al-sayyid-marsot/
Physics A Conceptual World View 7th Edition Larry
Kirkpatrick
https://ebookname.com/product/physics-a-conceptual-world-
view-7th-edition-larry-kirkpatrick/
Data modeling/database design life cycle
Universe of
Interest
Requirements
Specification
Process Data
Specifications Specifications
[ER Modeling
Process Model Conceptual Design/Schema
Grammar]
ER Diagram
Design-Specific + Updated semantic
Logical Data Modeling ER Model integrity constraints List
Technology-Independent
Logical Schema
[Information Preserving Grammar]
Technology-Independent
Normalization
Technology-Dependent
Technology-Dependent
Logical Schema
[Relational Modeling Grammar]
Physical Design/Schema
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
DATA MODELING AND
DATABASE DESIGN
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
DATA MODELING AND
DATABASE DESIGN
Second Edition
Narayan S. Umanath
University of Cincinnati
Richard W. Scamell
University of Houston
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Data Modeling and Database Design, © 2015 Cengage Learning
Second Edition
WCN: 02-200-203
2
Narayan S. Umanath and
Richard W. Scamell ALL RIGHTS RESERVED. No part of this work covered by the copyright
herein may be reproduced, transmitted, stored, or used in any form or by
Production Director: Patty Stephan any means graphic, electronic, or mechanical, including but not limited to
Product Manager: Clara Goosman photocopying, recording, scanning, digitizing, taping, Web distribution,
information networks, or information storage and retrieval systems, except
Managing Developer: Jeremy Judson
as permitted under Section 107 or 108 of the 1976 United States Copyright
Content Developer: Wendy Langeurd Act, without the prior written permission of the publisher.
Product Assistant: Brad Sullender
Senior Marketing Manager: Eric La Scola For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706
IP Analyst: Sara Crane
For permission to use material from this text or product,
Senior IP Project Manager: Kathryn Kucharek submit all requests online at www.cengage.com/permissions
Manufacturing Planner: Ron Montgomery Further permissions questions can be e-mailed to
permissionrequest@cengage.com
Art and Design Direction, Production
Management, and Composition:
PreMediaGlobal Library of Congress Control Number: 2014934580
Cover Image: © VikaSuh/www.Shutterstock.com ISBN-13: 978-1-285-08525-8
ISBN-10: 1-285-08525-6
Cengage Learning
20 Channel Center Street
Boston, MA 02210
USA
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
To Beloved Bhagwan Sri Sathya Sai Baba, the very source
of my thoughts, words, and deeds
To my Graduate Teaching Assistants and students,
the very source of my inspiration
To my dear children, Sharda and Kausik, always concerned
about their dad overworking
To my dear wife Lalitha, a pillar of courage I always lean on
Uma
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
BRIEF CONTENTS
Preface xvii
Chapter 1
Database Systems: Architecture and Components 1
Chapter 2
Foundation Concepts 30
Chapter 3
Entity-Relationship Modeling 79
Chapter 4
Enhanced Entity-Relationship (EER) Modeling 141
Chapter 5
Modeling Complex Relationships 197
Chapter 6
The Relational Data Model 280
P a r t I I I : N o rm a l i z a t i o n
Chapter 7
Functional Dependencies 358
Chapter 8
Normal Forms Based on Functional Dependencies 395
Chapter 9
Higher Normal Forms 467
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Brief Contents
P a r t I V : D a t a b a s e I mp l e me n t a t i o n U s i n g th e R e l a t i o n a l
Data Model
Chapter 10
Database Creation 506
Chapter 11
Relational Algebra 539
Chapter 12
Structured Query Language (SQL) 567
Chapter 13
Advanced Data Manipulation Using SQL 635
Appendix A
Data Modeling Architectures Based on the Inverted Tree
and Network Data Structures 719
Appendix B
Object-Oriented Data Modeling Architectures 731
Index 743
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
TABLE OF CONTENTS
Preface xvii
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x Table of Contents
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xi
P a r t I I I : N o rm a l i z a t i o n
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xii Table of Contents
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xiii
P a r t I V : Da t a b a s e I m p l e m e n t a t i o n U s i n g th e R e l a t i o n a l
Data Model
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv Table of Contents
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents xv
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
PREFACE
QUOTE
Everything should be made as simple as possible—but no simpler.
—Albert Einstein
Popular business database books typically provide broad coverage of a wide variety of
topics, including data modeling, database design and implementation, database
administration, the client/server database environment, the Internet database envi-
ronment, distributed databases, and object-oriented database development. This is
invariably at the expense of deeper treatment of critical topics, such as principles of
data modeling and database design. Using current business database books in our
courses, we found that in order to properly cover data modeling and database design,
we had to augment the texts with significant supplemental material (1) to achieve
precision and detail and (2) to impart the depth necessary for the students to gain a
robust understanding of data modeling and database design. In addition, we ended up
skipping several chapters as topics to be covered in a different course. We also know
other instructors who share this experience. Broad coverage of many database topics
in a single book is appropriate for some audiences, but that is not the aim of this
book.
The goal of Data Modeling and Database Design, Second Edition is to provide
core competency in the areas that every Information Systems (IS), Computer Science
(CS), and Computer Information Systems (CIS) student and professional should
acquire: data modeling and database design. It is our experience that this set of
topics is the most essential for database professionals, and that, covered in sufficient
depth, these topics alone require a full semester of study. It is our intention to
address these topics at a level of technical depth achieved in CS textbooks, yet make
palatable to the business student/IS professional with little sacrifice in precision. We
deliberately refrain from the mathematics and algorithmic solutions usually found in
CS textbooks, yet we attempt to capture the precision therein via heuristic
expressions.
Data Modeling and Database Design, Second Edition provides not just hands-on
instruction in current data modeling and database design practices, it gives readers a
thorough conceptual background for these practices. We do not subscribe to the idea
that a textbook should limit itself to describing what is actually being practiced.
Teaching only what is being practiced is bound to lead to knowledge stagnation.
Where do practitioners learn what they know? Did they invent the relational data
model? Did they invent the ER model? We believe that it is our responsibility to
present not only industry “best practices” but also to provide students (future practi-
tioners) with concepts and techniques that are not necessarily used in industry today
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xviii Preface
but can enliven their practice and help it evolve without knowledge stagnation. One
of the coauthors of this book has worked in the software development industry for
over 15 years, with a significant focus on database development. His experience indi-
cates that having a richness of advanced data modeling constructs available enhances
the robustness of database design and that practitioners readily adopt these techni-
ques in their design practices.
In a nutshell, our goal is to take an IS/CS/CIS student/professional through an
intense educational experience, starting at conceptual modeling and culminating in a
fully implemented database design—nothing more and nothing less. This educational
journey is briefly articulated in the following paragraphs.
STRUCTURE
We have tried very hard to make the book “fluff-free.” It is our hope that every sen-
tence in the book, including this preface, adds value to a reader’s learning (and foot-
notes are no exception to this statement).
The book begins with an introduction to rudimentary concepts of data, metadata,
and information, followed by an overview of data management. Pointing out the limita-
tions of file-processing systems, Chapter 1 introduces database systems as a solution to
overcome these limitations. The architecture and components of a database system that
makes this possible are discussed. The chapter concludes with the presentation of a
framework for the database system design life cycle. Following the introductory chapter
on database systems architecture and components, the book contains four parts.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xix
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xx Preface
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xxi
database systems. We have chosen to limit the scope of this book exclusively to data
modeling and database design since we firmly believe that this set of topics is the
core of database systems and must be learned in depth by every IS/CS/CIS student
and practitioner. Any system designed robustly has the potential to best serve the
needs of the users. More importantly, a poor design is a virus that can ruin an
enterprise.
In this light, we believe these are the unique strengths of this book:
• It presents conceptual modeling using the entity-relationship modeling gram-
mar including extensive discussion of the enhanced entity-relationship (ER)
model.
We believe that a conceptual model should capture all possible constraints
conveyed by the business rules implicit in users’ requirement specifica-
tions. To that end, we posit that an ER diagram is not an ER model unless
accompanied by a comprehensive specification of characteristics of and
constraints pertaining to attributes. We accomplish this via a list of
semantic integrity constraints (sort of a conceptual data dictionary) that
will accompany an ER diagram, a unique feature that we have not seen in
other database textbooks. We also seek to demonstrate the systematic
development of a multi-layer conceptual data model via a comprehensive
illustration at the beginning of each Part. We consider the multi-layer
modeling strategy and the heuristics for systematic development as unique
features of this book.
• It includes substantial coverage of higher-degree relationships and other
complex relationships in the entity-relationship diagram.
Most business database books seem to provide only a cursory treatment of
complex relationships in an ER model. We not only cover relationships
beyond binary relationships (e.g., ternary and higher-degree relationships),
we also clarify the nuances pertaining to the necessity and efficacy of
higher-degree relationships and the various conditions under which even
recursive and binary relationships are aggregated in interesting ways to
form cluster entity types.
• It discusses the information-preserving issue in data model mapping and
introduces a new information-preserving grammar for logical data modeling.
Many computer scientists have noted that the major difficulty of logical
database design (i.e., transforming an ER schema into a schema in the lan-
guage of some logical model) is the information preservation issue. Indeed,
assuring a complete mapping of all modeling constructs and constraints
that are inherent, implicit or explicit, in the source schema (e.g., ER/EER
model) is problematic since constraints of the source model often cannot be
represented directly in terms of structures and constraints of the target
model (e.g., relational schema). In such a case, they must be realized
through application programs; alternatively, an information-reducing trans-
formation must be accepted (Fahrner and Vossen, 1995). In their research,
initially presented at the Workshop on Information Technologies (WITS) in
the ICIS (International Conference on Information Systems) in Brisbane,
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxii Preface
SUPPORTING TECHNOLOGIES
Any business database book can be effective only when supporting technologies are
made available for student use. Yet, we don’t think that the type of book we are writ-
ing should be married to any commercial product. The specific technologies that will
render this book highly effective include a drawing tool (such as Microsoft Visio), a
software engineering tool (such as ERWIN, ORACLE/Designer, or Visible Analyst),
and a relational database management system (RDBMS) product (such as ORACLE,
SQL Server, or DB2).
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface xxiii
SUPPLEMENTAL MATERIALS
The following supplemental materials are available to instructors when this book is
used in a classroom setting. Some of these materials may also be found on the
Cengage Learning Web site at www.cengage.com.
• Electronic Instructor’s Manual: The Instructor’s Manual assists in class
preparation by providing suggestions and strategies for teaching the text, and
solutions to the end-of-chapter questions/problems.
• Sample Syllabi and Course Outline: The sample syllabi and course outlines
are provided as a foundation to begin planning and organizing your course.
• Cognero Test Bank: Cognero allows instructors to create and administer
printed, computer (LAN-based), and Internet exams. The Test Bank includes
an array of questions that correspond to the topics covered in this text,
enabling students to generate detailed study guides that include page refer-
ences for further review. The computer-based and Internet testing compo-
nents allow students to generate detailed study guides that include page
references for further review. The computer-based and Internet testing
components allow students to take exams at their computers, and also save
the instructor time by automatically grading each exam. The Test Bank is
also available in Blackboard and WebCT versions posted online at www
.course.com.
• PowerPoint Presentations: Microsoft PowerPoint slides for each chapter are
included as a teaching aid for classroom presentation, to make available to
students on the network for chapter review, or to be printed for classroom
distribution. Instructors can add their own slides for additional topics they
introduce to the class.
• Figure Files: Figure files from each chapter are provided for the instructor’s
use in the classroom.
• Data Files: Data files containing scripts to populate the database tables used
as examples in Chapters 11 and 12 are provided on the Cengage Learning
Web site at www.cengage.com.
ACKNOWLEDGMENTS
We have never written a textbook before. We have been using books written by our
academic colleagues, always supplemented with handouts that we developed our-
selves. Over the years, we accumulated a lot of supplemental material. In the begin-
ning, we took the positive feedback from the students about the supplemental
material rather lightly until we started to see comments like “I don’t know why I
bought the book; the instructor’s handouts were so good and much clearer than the
book” in the student evaluation forms. Our impetus to write a textbook thus origi-
nated from the consistent positive feedback from our students.
We also realized that, contrary to popular belief, business students are certainly
capable of assimilating intricate technical concepts; the trick is to frame the concepts
in meaningful business scenarios. The unsolicited testimonials from our alumni about
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxiv Preface
the usefulness of the technical depth offered in our database course in solving real-
world design problems reinforced our faith in developing a book focused exclusively
on data modeling and database design that was technically rigorous but permeated
with business relevance.
Since we both teach database courses regularly, we have had the opportunity to
field-test the manuscript of this book for close to 10 years at both undergraduate-level
and graduate-level information systems courses in the Carl Lindner College of
Business at the University of Cincinnati and in the C. T. Bauer College of Business at
the University of Houston. Hundreds of students—mostly business students—have
used earlier drafts of this textbook so far. Interestingly, even the computer science
and engineering students taking our courses have expressed their appreciation of the
content. This is a long preamble to acknowledge one of the most important and for-
mative elements in the creation of this book: our students.
The students’ continued feedback (comments, complaints, suggestions, and criti-
cisms) have significantly contributed to the improvement of the content. As we were
cycling through revisions of the manuscript, the graduate teaching assistants of
Dr. Umanath were a constant source of inspiration. Their meaningful questions and
suggestions added significant value to the content of this book. Dr. Scamell was ably
assisted by his graduate assistants as well.
We would also like to thank the following reviewers whose critiques, comments,
and suggestions helped shape every chapter of this book’s first edition:
Akhilesh Bajaj, University of Tulsa
Iris Junlgas, Florida State University
Margaret Porciello, State University of New York/Farmingdale
Sandeep Purao, Pennsylvania State University
Jaymeen Shah, Texas State University
Last, but by no means the least, we gratefully acknowledge the significant contri-
bution of Deb Kaufmann and Kent Williams, the development editors of our first and
second editions, respectively. We cannot thank them enough for their thorough and
also prompt and supportive efforts.
Enjoy!
N. S. Umanath
R. W. Scamell
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 1
DATABASE SYSTEMS:
ARCHITECTURE AND
COMPONENTS
Data modeling and database design involve elements of both art and engineering.
Understanding user requirements and modeling them in the form of an effective logical
database design is an artistic process. Transforming the design into a physical database
with functionally complete and efficient applications is an engineering process.
To better comprehend what drives the design of databases, it is important to under-
stand the distinction between data and information. Data consists of raw facts—that is,
facts that have not yet been processed to reveal their meaning. Processing these facts
provides information on which decisions can be based.
Timely and useful information requires that data be accurate and stored in a manner
that is easy to access and process. And, like any basic resource, data must be managed
carefully. Data management is a discipline that focuses on the proper acquisition, storage,
maintenance, and retrieval of data. Typically, the use of a database enables efficient and
effective management of data.
This chapter introduces the rudimentary concepts of data and how information
emerges from data when viewed through the lens of metadata. Next, the discussion
addresses data management, contrasting file-processing systems with database systems.
This is followed by brief examples of desktop, workgroup, and enterprise databases. The
chapter then presents a framework for database design that describes the multiple tiers of
data modeling and how these tiers function in database design. This framework serves as a
roadmap to guide the reader through the remainder of the book.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 1
the number 31 (obtained by summing the 10 digits). A mathematician may see a set of
2
prime numbers, viz., 2, 3, 5, 7, 11, 13, 17. Another might see a person’s phone number with
the first three digits constituting the area code and the remaining seven digits the local
phone number. On the other hand, if the first digit is used to represent a person’s gender
(1 for male and 2 for female) and the remaining nine digits the person’s Social Security
number, the 10 digits would mean something else. Numerous other interpretations are pos-
sible, but without a context it is impossible to say what the digits represent. However, when
framed in a specific context (such as being told that the first digit represents a person’s
gender and the remaining digits the Social Security number), the data is transformed into
information. It is important to note that “information” is not necessarily the “Truth” since
the same data yields different information based on the context; information is an inference.
Metadata, in a database environment, is data that describes the properties of data. It
contains a complete definition or description of database structure (i.e., the file structure,
data type, and storage format of each data item), and other constraints on the stored data.
For example, when the structure of the 10 digits 2357111317 is revealed, the 10 digits
become information, such as a phone number. Metadata defines this structure. In other
words, through the lens of metadata, data takes on specific meaning and yields information.1
Metadata may be characterized as follows:
• The lens to view data and infer information
• A precise definition of the context for framing the data
Table 1.1 contains metadata for the data associated with a manufacturing plant. Later
in this chapter, we will see that in a database environment, metadata is recorded in what
is called a data dictionary.
Record
Type Data Element Data Type Size Source Role Domain
As reflected in Table 1.1, the smallest unit of data is called a data element. A group of
related data elements treated as a unit (such as Pl_name, Pl_number, Budget, Building,
1
With the advent of the data warehouse, the term “metadata” assumes a more comprehensive
meaning to include business and technical metadata, which is outside the scope of the current
discussion.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Database Systems: Architecture and Components
and No_of_employees) is called a record type. A set of values for the data elements con-
3
stituting a record type is called a record instance or simply a record. A file is a collection
of records. A file is sometimes referred to as a data set. A company with 10 plants would
have a PLANT file or a PLANT data set that contains 10 records.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 1
billing systems. Nonetheless, understanding their limitations provides insight into the
4
development of and justification for database systems.
Figure 1.1 shows three file-processing systems for a hypothetical university. One pro-
cesses data for students, another processes data for faculty and staff, and a third processes
data for alumni. In such an environment, each file-processing system has its own collec-
tion of private files and programs that access these files.
While an improvement over the manual systems that preceded them, file-processing
systems suffer from a number of limitations:
• Lack of data integrity—Data integrity ensures that data values are correct,
consistent, complete, and current. Duplication of data in isolated file-
processing systems leads to the possibility of inconsistent data. Then it is
difficult to identify which of these duplicate data is correct, complete, and/
or current. This creates data integrity problems. For example, if an
employee who is also a student and an alumnus changes his or her mailing
address, files that contain the mailing address in three different file-
processing systems require updating to ensure consistency of information
across the board. Data redundancy across the three file-processing
systems not only creates maintenance inefficiencies, it also leads to the
problem of not knowing which is the current, correct, and /or complete
address of the person.
• Lack of standards—Organizations with file-processing systems often lack or
find it difficult to enforce standards for naming data items as well as for
accessing, updating, and protecting data. The absence of such standards can
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Database Systems: Architecture and Components
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 1
2
In a database context, the word “schema” stands for “description of metadata.”
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Database Systems: Architecture and Components
3
While an external schema is technically a collection of external subschemas or views, the term
“external schema” is used here in the context of either an individual user view or a collection of
different user views.
4
Informally, a “view” is a term that describes the information of interest to a user or a group of
users, where a user can be either an end user or a programmer. See Chapter 6 (Section 6.4) for
a more precise definition of a “view.”
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 1
schema. The internal schema describes the physical structure of the stored data (how the
8
data is actually laid out on storage devices) and the mechanism used to implement the
access strategies (indexes, hashed addresses, and so on). The internal schema is con-
cerned with efficiency of data storage and access mechanisms in the database. Thus, the
internal schema is technology dependent, while the conceptual schema and external
schemas are technology independent. In principle, user views are generated on demand
through logical reference to data items in the conceptual schema independent of the logi-
cal or physical structure of the data.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Database Systems: Architecture and Components
in Figure 1.3. Here, the programmer’s view corresponds to the physical structure of the
9
data, meaning that the physical structure of data (internal schema) is fully mapped
(incorporated) into the application program. The file-processing system lacks program-
data independence because any modification to the storage structure or access strategy in
the internal schema necessitates changes to application programs and subsequent recom-
pilation and testing. In the absence of a conceptual schema, the internal schema struc-
tures are necessarily mapped directly to external views (or subschemas). Consequently,
changes in the internal schema require appropriate changes in the external schema;
therefore, data independence is lost. Because changes to the internal schema, such as
incorporating new user requirements and accommodating technological enhancements,
are expected in a typical application environment, absence of a conceptual schema essen-
tially sacrifices data independence. In short, file-processing systems lack data indepen-
dence because they employ what amounts to a two-schema architecture.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 1
10
1.5 CHARACTERISTICS OF DATABASE SYSTEMS
Database systems seek to overcome the two root causes of the limitations that plague file-
processing systems by creating a single integrated set of files that can be accessed by all
users. This integrated set of files is known as a database. A database management system
(typically referred to as a DBMS) is a collection of general-purpose software that facilitates
the processes of defining, constructing, and manipulating a database for various applica-
tions. Figure 1.4 provides a layman’s view of the difference between a database and a
database management system. This illustration shows how neither a user nor a program-
mer is able to access data in the database without going through the database manage-
ment system software. Whether a program is written in Java, C, COBOL, or some other
language, the program must “ask” the DBMS for the data, and the DBMS will fetch the
data. SQL (Structured Query Language) has been established as the language for acces-
sing data in a database by the International Organization for Standardization (ISO) and
the American National Standards Institute (ANSI). Accordingly, any application program
that seeks to access a database must do so via embedded SQL statements.
An important purpose of this book is to discuss how to organize the data items con-
11
ceptualized in Figure 1.4. In reality, data items do not exist in one big pool surrounded by
the database management system. Several different architectures exist for organizing this
data. One is a hierarchical organization, another is a network organization, and a third is
relational; in this book, the relational approach is emphasized.5 While the data items that
collectively comprise the database at the physical level are stored as sequential, indexed,
and random files, the DBMS is a layer on top of these files that frees the user and appli-
cation programs from the burden of knowing the structures of the physical files (unlike a
file-processing system).
Next, let us look more closely at what constitutes a database, a database management
system, and finally a database system.
5
Two relatively new data modeling architectures (the object-oriented data model and the object-
relational model) also exist. Appendix B briefly discusses each of these architectures. Appendix A
reviews architectures based on the hierarchical and network organizations.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 1
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Database Systems: Architecture and Components
13
Data manipulation languages (DMLs) facilitate the retrieval, insertion, deletion, and
modification of data in a database. SQL is the most well-known nonprocedural6 DML and
can be used to specify many complex database operations in a concise manner. Most
DBMS products also include procedural language extensions to supplement the capabilities
of SQL, such as Oracle PL/SQL. Other examples of procedural language extensions are
languages such as C, Java, Visual Basic, and COBOL, in which pre-compilers extract data
manipulation commands written in SQL from a program and send them to a DML com-
piler for compilation into object code for subsequent database access by the run-time sub-
system.7 Finally, the access routines handle database access at run time by passing
requests to the file manager of the operating system to retrieve data from the physical files
of the database.
Much as a dictionary is a reference book that provides information about the form,
origin, function, meaning, and syntax of words, a data dictionary in a DBMS environment
6
SQL is known to be a nonprocedural language since it only specifies what data to retrieve as
opposed to specifying how actually to retrieve it. A procedural language specifies how to retrieve
data in addition to what data to retrieve.
7
The run-time subsystem of a database management system processes applications created by the
various design tools at run time.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Exploring the Variety of Random
Documents with Different Content
138 FIGHTING THE NORTH VIETNAMESE taking casualties
and requested a helicopter medevac. In an effort to pick up some of
the casualties, Captain Ronald D. Bennett of HMM-363 attempted to
land his UH-34D within the 2d Battalion's perimeter. Those on the
ground waved him off because of intense enemy fire. As Captain
Bennett pulled away, enemy fire hit the rear of the helicopter,
separating the tail pylon. The aircraft crashed, rolled and began
burning about 150 meters outside the Marine lines. Bennett and a
gunner, Corporal Edward Clem, died in the crash. Second Lieutenant
Vernon J. Sharpless and Lance Corporal Howard J. Cones, both
seriously injured, managed to crawl from the burning wreckage. A
second helicopter from HMM-363, piloted by Captain Frank T. Grassi,
tried to land to pick up the survivors but could not. Enemy fire hit
Grassi in the leg and arm, damaged the helicopter, and slightly
wounded one of the gunners and a Navy hospital corpsman. The
aircraft limped away as far as Strong Point C-2 where it made a
forced landing. Captain James E. Murphy, the 2d Battalion, 4th
Marines' air liaison officer, who had been calling in air strikes in front
of Company E, saw Bennett's helicopter go down. With his radio still
on his back, Murphy crawled out to the downed helicopter, moving
past NVA soldiers in his path. He found the two survivors near the
burning helicopter. The three Marines were surrounded and there
was no way Murphy could get them back to Marine lines.
Fortunately, the enemy soldiers in the area either did not know the
three men were there or simply did not care. Captain Murphy could
hear NVA soldiers nearby and see some movement, however, and
called in air strikes within 50 meters of the crashed helicopter with
the aid of an airborne observer in an O-lC aircraft overhead. The
latter eventually managed to direct a Marine A-4 attack aircraft to
deliver a line of smoke so that a UH-1 helicopter could land and
rescue the three Marines.28 The rescue helicopter was a UH-1C from
the U.S. Army's 190th Helicopter Assault Company whose pilot
volunteered to make the pickup. Enemy fire hit the aircraft twice
during the rescue and the pilot suffered a minor wound in the arm.
The UH-lC also managed to reach Strong Point C-2 where it, too,
made a forced landing. Lieutenant Colonel Studt's observation during
his short period of command convinced him of the need for
reinforcements. At his request, the 9th Marines ordered the 3d
Battalion, 3d Marines at C-2 Bridge to send two companies and a
small command group to the 2d Battalion, 4th Marines' position.29
Company F still occupied its exposed position and Studt decided to
move it within the battalion perimeter. He directed the company to
have its attached engineers blow up the excess ammunition, but
they were unable to do so.* After several hours of fruitless attempts
by the engineers, Studt told the company to leave the ammunition
and join the rest of the battalion. The battalion had direct
observation of the ammunition pile and would cover it by fire.30
Company F reached the perimeter near dusk. The two companies
from the 3d Battalion, 3d Marines arrived at about the same time.31
With these reinforcements, the 2d Battalion, 4th Marines was ready
for any NVA attacks that evening. Studt recounted the night's
subsequent events: From before dusk . . . until almost 0200 in the
morning, we were under almost continuous attacks by both direct
and indirect fire, and our perimeter was hit again and again by
ground attacks. . . . The wounded were being accumulated in the
vicinity of my CP, which consisted of foxholes, and their suffering
was a cause of anguish. After several attempts to medevac them by
helicopter were aborted due to intense enemy fire, we came up with
the plan that on signal every man on the perimeter would open fire
on known or suspected enemy positions ... for a few minutes with
an intense volume of fire. During this brief period, a volunteer pilot .
. . succeeded in zipping into the zone and removing our emergency
medevacs. The [trick] . . . probably would not have worked again.52
The ground attacks ceased around 0200 in the morning of the 27th,
but the Marines heard enemy movement for the rest of the night as
the North Vietnamese removed their dead and wounded. Dawn
revealed 19 enemy bodies within or in sight of the Marine positions.
Lieutenant Colonel Studt decided not to send anyone to sweep the
area since any movement still drew enemy artillery and mortar
fire.33 The enemy completed its departure by dawn. The Marines
soon did likewise; on orders from the 9th Marines, the battalion
made a tactical withdrawal. Still harrassed by enemy rocket and
mortar fire and carrying the remainder of its dead and wounded, the
2d Battalion, 4th Marines moved by echelon to *The reason for the
failure to detonate the ammunition is not clear from the records.
Studt himself wrote in 1981 that he never knew the reason. Col John
C. Studt, Comments on draft ms, 9jul81 (Vietnam comment file,
MCHC, Washington, D.C.)
FALL FIGHTING IN THE NORTH 139 Strong Point C-2 and
then to Cam Lo.34 During the period 25-27 October, eight 2d
Battalion Marines died and 45 suffered wounds giving the battalion
an effective strength of around 300 Marines. Known NVA casualties
were the 19 bodies counted by the battalion on 27 October. The
battalion moved back to Dong Ha on the 28th and resumed its role
as the regimental reserve. Lieutenant Colonel William Wiese took
command of the 2d Battalion, 4th Marines and Lieutenant Colonel
Studt returned to his duties at the 9th Marines' command post.*
That day a message from Lieutenant General Cushman arrived, the
last line of which read "2/4 has met and beaten the best the enemy
had to offer. Well done."35 Kingfisher listed 1,117 enemy killed and
five captured; Marine casualties totaled 340 killed and 1,461
wounded. General Westmoreland described the operation as a
"crushing defeat" of the enemy. The Con Thien area remained a
grim place. The constant danger of artillery, rocket, and mortar fire,
and massed infantry assaults, and the depressing drizzle and mud
from which there was no escape, combined to make it miserable for
the Marines there. Neuropsychiatric or "shell shock" casualties,
relatively unheard of elsewhere in South Vietnam, were not unusual.
Duty on and around the drab hill mass was referred to by all Marines
as their "Turn in the Barrel," or "the Meatgrinder."36 Medina /Bastion
Hill/Lam Son 138 On 5 October, in conjunction with the arrival of a
fourth U.S. Army brigade in southern I Corps, Colonel Herbert E.
Ing, Jr.'s 1st Marines, consisting of two battalions, came under the
operational control of the 3d Marine Division and moved north from
the Da Nang TAOR to the southern part of Quang Tri Province. On
the 11th, the regiment, reinforced by SLF Alpha, started Operation
Medina in the rugged hills of the Hai Lang National Forest.** The
operation was part of III MAF's comprehensive program to *Studt
had hoped to retain command but Colonel Smith was more
interested in keeping him as the regimental operations officer.
"Unfortunately," wrote Smith, "I extolled [Studt's] virtues so much to
General Tompkins that he was grabbed later to take over a battalion
at Khe Sanh where he distinguished himself." Colonel Richard B.
Smith, Comments on draft ms, 2lMay81 (Vietnam comment file,
MCHC, Washington, D.C.) **SLF Alpha's (BLT 1/3) move to its
Medina blocking positions had the code-name Operation Bastion Hill.
Department of Defense Photo (USMC) A189393 Marines and
journalists wait on 2 October in the safety of a trench beside Con
Thien s landing zone until the arrival and touchdown of the
helicopter that will take them from the base back to Dong Ha.
destroy enemy base areas previously left alone because of lack of
forces. The Hai Lang forest area south of Quang Tri was the enemy's
Base Area 101, the support area for the 5th and 6th NVA Regiments.
Northeast of the Medina AO, two ARVN airborne battalions
conducted Operation Lam Son 138. Medina started as Lieutenant
Colonel Albert F. Belbusti's 1st Battalion, 1st Marines and Lieutenant
Colonel Archie Van Winkle's 2d Battalion, 1st Marines made a
helicopter assault landing in the forest. After landing they cleared
the area around LZ Dove and then swept in a northeasterly direction
while BLT 1/3 blocked to the east. At 0330 on the 11th, Company C
of BLT 1/3 came under mortar and small arms fire, followed by^ a
ground assault. The company drove off the attackers and the
fighting subsided. The next day both of the 1st Marines' battalions
continued searching to the southwest, while BLT 1/3 remained in its
blocking positions. At 1515, Company C, 1st Marines was moving
through thick jungle when the point element engaged 10 NVA
soldiers. The exchange of fire wounded several Marines. Company C
pulled back to a small clearing
FALL FIGHTING IN THE NORTH 141 Department of Defense
Photo (USMC) A421900 Operation Medina begins early on 11
October as two battalions of the 1st Marines make a helicopter
assault into Landing Zone Dove in a III MAF drive to clear enemy
base areas in the thick Hai Lang forest, located approximately 12
miles south of Quang Tri City. and established a perimeter before
calling in helicopters to pick up wounded. Just after the evacuation
was completed, three NVA companies attacked Company C from two
sides. The firefight continued as darkness fell; hand grenades
figured heavily in the exchange. The battle surged back and forth
across the small clearing. At the height of the struggle a grenade
landed in the company command post. Corporal William T. Perkins,
Jr., a combat photographer attached to the company, yelled,
"Grenade!" and threw himself on the deadly missile. The explosion
killed him.* Lieutenant Colonel Belbusti reinforced Company C with
Company D and the two companies drove off the attacking NVA
force. Dawn on the 13th revealed 40 enemy dead around the
Marines' position. The enemy attack had killed eight Marines and
wounded 39. After these two fights, the enemy avoided further
contact; Medina turned into a search for small groups of North
Vietnamese in the nearly impenetrable forests. The 1st Marines did
find a number of base camps, but the enemy had evacuated the
sites. The Marines captured more than •Corporal Perkins received a
posthumous Medal of Honor, becoming the first Marine combat
photographer to receive the nation's highest award. See Appendix D
for Corporal Perkins' citation. 3d MarDiv ComdC, October 1967 An air
observer with the 1st Battalion, 1st Marines directs an air strike early
in Operation Medina on enemy positions located on an adjacent
ridgeline.
142 FIGHTING THE NORTH VIETNAMESE four tons of rice,
16 weapons, and a quantity of small arms ammunition. The enemy's
efforts to elude the sweeping Marine units resulted in the largest
action of the companion Operation Lam Son 138. On the morning of
20 October, the 4l6tb NVA Battalion, a subordinate unit of the 5th
NVA Regiment collided with one of the ARVN airborne companies
involved in Operation Lam Son 138. The airborne company held and,
after reinforcement, killed 197 North Vietnamese in the day-long
battle. Operation Medina ended on the 20th. The SLF battalion
transferred to Colonel William L. Dick's 4th Marines, which was
conducting Operation Fremont to the south. The 1st Marines stayed
in the former Medina area and started Operation Osceola the same
day. Osceola was an unspectacular, but systematic, search for enemy
forces in the Hai Lang forest. Adjustments Within the 3d Marine
Division A new series of operations began in November. Only
Osceola continued from October. The 3d 3d MarDiv ComdC, October
1967 A Marine with the 1st Battalion, 1st Marines places explosives
before blowing a helicopter landing zone in the Hai Lang forest
during Operation Medina. Department of Defense Photo (USMC)
A193856 An LVTP-5 carries members of the 1st Amphibian Tractor
Battalion, operating as infantrymen, on a sweep of the shoreline
north of the Cua Viet River in September. The battalion continued
these patrols in November and December in Operation Napoleon.
Marine Division split the Kingfisher TAOR in two: Kentucky,
embracing the region including Gio Linh, Con Thien, Cam Lo, and
Dong Ha came under the control of Colonel Richard B. Smith's 9th
Marines; and Lancaster, to the west, covered Camp Carroll, the
Rockpile, and Ca Lu under Colonel Joseph E. LoPrete's 3d Marines.
The division renamed Operation Ardmore at Khe Sanh to Scotland
and continued it as a one-battalion operation under the control of
Colonel David E. Lownds' 26th Marines. On the coast, the 1st
Amphibian Tractor Battalion conducted Operation Napoleon north of
the Cua Viet River. In Thua Thien Province, Colonel William L. Dick's
4th Marines continued to cover approaches to Hue City west of
Route 1 as Operation Neosho replaced Fremont. The 3d Marine
Division had tactical responsibility for all territory west of Highway 1
in the northern two provinces of Quang Tri and Thua Thien, while
the 1st ARVN Division was responsible for all terrain east of the road
except for the Napoleon operational area north of the Cua Viet River.
Artillery support for all of these operations came from Colonel Edwin
S. Schick, Jr.'s 12th Marines. Composed of five Marine artillery
battalions, three Army artillery battalions, and two Marine separate
FALL FIGHTING IN THE NORTH 143 batteries, it was the
largest artillery regiment in the history of the Marine Corps. The
reinforced regiment's 220 weapons37 were located throughout the
division TAOR. Each infantry regiment could call upon a direct
support battalion of 105mm howitzers. In addition, the artillery
regiment's medium 155mm howitzers and guns, and heavy 8-inch
howitzers and 175mm guns, provided reinforcing or general support
fires. While the new operations were beginning, the division
headquarters at Phu Bai prepared for a visit from Vice President
Hubert H. Humphrey on 1 November. After the stop at the division
command post, the Vice President flew over the division's area of
operations. Upon his return to Da Nang, he presented the
Presidential Unit Citation to the 3d Marine Division for "extraordinary
heroism and outstanding performance of duty in action against
North Vietnamese and insurgent Communist forces in the Republic of
Vietnam from 8 March 1965 to 15 September 1967." After pinning
the streamer on the division colors, the Vice President warmly
congratulated the division commander, Major General Hochmuth.
This was the last official ceremony that the general attended. Major
General Hochmuth died on 14 November when his UH-lE exploded
and crashed five miles northwest of Hue. Colonel William L. Dick,
commanding the 4th Marines at Phu Bai, learned of the crash around
1400 on 14 November. Since he had a helicopter sitting on a pad at
his headquarters, Dick, accompanied by his operations officer, Major
James D. Beans, and the regimental sergeant major, quickly reached
the crash scene. Colonel Dick described the rescue attempt: After
several passes, I spotted the Huey upside down in a rice paddy filled
to the brim by the heavy rains which had been falling for several
weeks. ... I directed the helicopter pilot to land on the paddy dike
nearest the crash site from where the three of us walked through
about 200 yards of paddy water until we reached the wreckage.
There were flames on the water's surface around the aircraft. While
the sergeant major attempted to extinguish these, Major Beans and
I commenced diving beneath the surface, groping through the water
for possible survivors. We had no idea just how long it had been
since the crash had occurred. This was a difficult task, as you can
imagine, since the water was full of silt, not to mention leeches, and
impossible to see through. The three of us were joined by a
Vietnamese farmer who refused to identify himself and could be
distinguished only by a small gold crucifix around A machine gun
team from Company F, 2d Battalion, 9th Marines pauses during its
movement in November in Operation Lancaster in the 9th Marines'
portion of the former Operation Kingfisher area. The team wears its
ammunition bandolier-style. 3d MarDiv ComdC, November 1967
144 FIGHTING THE NORTH VIETNAMESE Department of
Defense Photo (USMC) A190235 Ma/Gen Bruno A. Hochmuth, the
commanding general of the 3d Marine Division, wearing a rainsuit as
protection from the monsoon, sits in a UH-1E helicopter prior to a
routine inspection of the divisional area on 7 November, one week
prior to his death. his neck. The four of us, after getting rid of the
aviation fuel flames, repeatedly went below the surface into the
helicopter cabin and by touch, finally found the bodies, one by one,
of the six who had died in the crash. The helicopter had turned
upside down just before impact which made the situation even more
difficult. The last body recovered was General Hochmuth. I found
him in the rear seat of the helicopter, the spot where he usually
traveled when visiting the various command posts.38 Major General
Rathvon McC. Tompkins, a veteran of more than 32 years' Marine
service and holder of the Navy Cross as a battalion commander at
Saipan, received immediate orders as General Hochmuth's
replacement. Brigadier General Louis Metzger, the assistant division
commander, assumed command until General Tompkins arrived from
the United States on 28 November. One of General Tompkins' first
steps after his arrival was to discuss the overall situation with his
division operations officer, Colonel James R. Stockman, who had
commanded an 81mm mortar platoon under Tompkins on Saipan.
"Tell me," said Tompkins, "about the operational folklore in the
division's area of operations." Stockman replied with, among other
things, descriptions of the enemy and the terrain and the
frustrations of fighting under the Department of Defense Photo
(USMC) A189947 MajGen Rathvon McC. Tompkins inspects an honor
guard on 28 November during the ceremony at Da Nang in which he
assumed command of the 3d Marine Division after MajGen
Hochmuth's death.
FALL FIGHTING IN THE NORTH 145 restrictions imposed by
MACV and Washington. Stockman recalled that Tompkins disliked the
system which considered infantry battalions as interchangeable parts
to be shifted from one regimental headquarters to another,
depending upon the tactical situation. Tompkins accepted it,
however, as "temporary operational folklore," which he would have
to live with. "He faced," wrote Stockman, "a worsening operational
situation in the late part of 1967 with as much fortitude and
optimism as humanly possible."39 During November and December,
the most significant activity in the 3d Marine Division's zone of action
was small unit fighting near the strongpoint obstacle system around
Con Thien and Gio Linh. In November, platoon and company-size
NVA units operated from well camouflaged bunkers in the area,
trying to ambush Marine patrols and to hinder the system's
construction. The Marines countered with attacks that drove the NVA
units out of their positions on four different occasions during
November, killing 65 Communists. In addition, Marine patrols found
and destroyed three extensive Department of Defense Photo (USMC)
A189948 Company G, 2d Battalion, 9th Marines engages an NVA unit
on 3 December during the portion of Operation Kentucky conducted
to prevent enemy interference with the construction of Strongpoint
A-3 of the barrier system south of the DMZ. The 3d Marine Division
originally planned to call this protective effort Operation Newton but
decided on 28 November to consider it as simply part of Kentucky.
Department of Defense Photo (USMC) A189997 A patrol from
Company F, 9th Marines, part of the screening effort during the
construction of Strongpoint A-3, moves out carefully after finding
fresh enemy footprints and bunkers on 22 December. bunker
systems. On 29 November, three Marine battalions and two ARVN
battalions began clearing operations within the Kentucky TAOR
between Con Thien and Gio Linh, the planned site of Strong Point A-
3 of the proposed barrier plan, or "McNamara wall." The Marine
units swept south of Con Thien eastward to Site A-3, while the ARVN
units moved from near Gio Linh westward to clear a road to the
strong point location. The following day, Lieutenant Colonel William
M. Cryan's 2d Battalion, 9th Marines found a North Vietnamese
company in bunkers two and one-half miles northeast of Con Thien.
The battalion maneuvered to envelop the enemy and overran the
position by 1800, killing 41 defenders. Marine casualties totaled 15
killed and 53 wounded requiring evacuation. Although the Marine
and ARVN units continued screening operations north of A-3 during
December, the largest engagement during the month took place
southeast of Gio Linh in the Napoleon area of operation. Lieutenant
Colonel Edward R. Toner's 1st Amphibian Tractor Battalion and
Company F, 2d Battalion, 4th Marines were protecting the movement
of building materials to Strongpoint C-4 on the coast, two kilometers
north of the Cua Viet River. Company F, under the operational control
of the tractor battalion, occupied Strongpoint C-4. Platoon and
146 FIGHTING THE NORTH VIETNAMESE squad patrols
routinely operated 2,000 meters north of C-4 as forward security for
both the strongpoint and the battalion's position at Cua Viet port
facility. Early in the afternoon of the 10th, two squads patrolled near
the fishing village of Ha Loi Tay. Their operational area was a sea of
sand dunes, interrupted by a strip of scrub pine growth and
hedgerows dotting the coastline. As they approached a break in the
coastal tree line south of the village, sniper fire surprised them. The
Marines fired back, killing eight North Vietnamese. The enemy fire
killed one Marine and wounded three in this brief encounter. As the
Marines checked the area, they discovered 20-25 NVA soldiers, some
wearing American helmets and flak jackets. The Marines opened fire
and called for reinforcements. The company commander, First
Lieutenant Michael H. Gavlick, radioed the situation to the battalion
CP, and then took a platoon and the third squad of the engaged
platoon forward to join the battle. Contact continued throughout the
afternoon. Before dark, Lieutenant Colonel Toner ordered two
provisional rifle platoons from his Company B and two LVTH-6s to go
to the scene of contact to assist. As darkness settled, Lieutenant
Gavlick drew his composite force into a tight perimeter. At 0630 on
the 11th, the composite unit moved out under a light drizzle toward
the area of the previous day's action. At 0800, lead elements spotted
40 of the enemy trying to move south across the break in the tree
line. The Marines observed 11 NVA soldiers digging a mortar position
and another 15 moving behind a sand dune to the north. While the
Marines took these enemy under fire with artillery and the LVTH-6s,
Lieutenant Colonel Toner moved his Company A, organized as an
infantry unit, and his command group to Strong Point C-4. At the
same time, the U.S. advisor with the ARVN battalion occupying
Strong Point A-l, 2,500 meters across the sand dunes west of the
contact, asked if his battalion could help. Toner asked the ARVN
battalion to move a unit into a blocking position southwest of the
action. The NVA force had moved around to the west of the Marines
and were now attacking from the south. The advisor informed Toner
that an ARVN company would move to the desired blocking position.
Fifteen of the enemy had already attacked the Marines and,
although driven off, had fired 10 RPG antitank rounds. One of these
rounds hit a LVTH-6 on the bow, but the round glanced off without
damaging the tractor. The LVTH-6 destroyed the antitank gunners'
position with direct 105mm howitzer fire. The number of enemy
troops involved in the battle increased. A 30-minute firefight began;
Gavlick's composite company took heavy small arms fire from three
sides, then the Communists began hitting the Marines with mortars.
Throughout the action, the two LVTH-6s maneuvered back and forth
to engage the enemy, often firing at ranges between 50 to 150
meters. The remaining four LVTH-6s at Cua Viet and a detachment
of 4. 2 -inch mortars at C-4 added their fire to the battle. As the
Marines tightened their perimeter, the NVA made a second assault.
Fifty-five of the enemy attacked from the north, 12 more came in
from the northeast, and 20 others from the south. Again, mortar fire
supported their assault. The Marines responded with artillery, and
used naval gunfire to hold back enemy reinforcements. The
Communist assault failed, but individual soldiers continued to pop up
around the perimeter. One audacious NVA mortar crew, protected by
infantry, went into action on an exposed sand dune only 90 meters
from the Marine perimeter. They fired six rounds before machine
guns and direct fire from one of the LVTH-6s killed them. 3d MaiDiv
ComdC, December 1967 PFC F. N. Bunton carries a small Christmas
tree on bis pack while on Operation Kentucky with Company C, 1st
Battalion, 4th Marines in December.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookname.com