Your SlideShare is downloading. ×
Distributed  and centralized database
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Distributed and centralized database

93
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
93
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Distributed and centralized database: Difference:  Nadra is the centralized database.in Islamabad.  Nadra is also the distributed database.  Because if we want to take the information of any citizens, then we can easily get the information from  The local place where  Beyond of the database , we use the network.  Banks database is also centrized database.  Atm is distributed database.  Remote login is done with the help of the distributed database.  Different media use for remote login.  Buffereing.  When we save the data , then we saved is in any memory. Or cache or ram.  Buffer is a name of temporary space of loading the temporary files.  DISTRIBUTED GAMES used  Peer to peer network :  Directly communicate or data transfer or file transfer.  Web surfing (searching of data on the web is called the web surfing) Communication oriented services:  When we sent or transfer the file or data , then reciver send the message ..and it is message of authentication. Or acknowledgment. And it is reliable services. Communicationless services:  It is unreliable.  Not aknoledgement.  Aknowldement: Post office (in old ancient, letter are posted , may be misplace ..and it is unreliable. Tcs (it is reliable) Coeer services (it is more realible)
  • 2. Connection oriented : Received complete packets. Sequence remain same. Not misdisplace. Reliable Connectionless : It is opposite of above. A has fixed ascii code 65 and its binary is 100000x We sent the files but tranmsision is done and receiver is recived the files. And send the message of Akknoledgment. And it is reliable connections. When send the files but transmission is not doen and reciver wait some times and send the message of negative aknolwgemnt. And packet may be lost or files be lost. FLOW CONTROL: Sender send the multiple files but the receiver have no space and he drop some of files. It must be matched.’ In flow control , files is lost. Congestion: Congestion means data is block. And other reciver waits the data. Sender packets send slowly when reciver send the message the traffic is heavey. Tcp is connection oriented protocol
  • 3. Other protocol is http, smtp etc. Connectionless oriented: User datagram protocol (UDP) multimedia Above properties opposite. DNS Internet telephony (skype , messagner) And its protocol is VOIP (voice over ip) DIFFERENCE B/W TCP AND UDP Table used it is good method. TCP : Reliable Performs three handshake i.e: Sender estbalsh the connection then data is transfer  Connection establish  Data transfer  Disconnect Speed is high but cost is more. Because it is reliable. Udp: It is much faster than the tcp.
  • 4. No connection is established. No ackhnolwedgemnt. May be change the sequence of data. Video is unreliable services. uDP protocol is used. It is unreliable. But its cost may be less Speed Cost We can’t install the technology. We install the software. Hardware Software Protocol: Whole communication is due to the protocol e.g mail if we send the mail, then we used the SMTP.and reciver is recived., and if we download the files or specific data, then we used the POP protocol if we blocked the port no 80 i.e HTTP then pages can’t displayed. But interent is avaible. If we send the mail to reciver and reciver also send the mail to other .then both of these are used same protocol. i.e SMTP
  • 5. option---encrpted it is used for office 7. files may not be open due to the password. 2nd It may not be opened due to encrupt of files Format may be change.. The network core: Mesh (huge) wan and man used then is long distanvce. Lan is small distance device. Mostly we used the routers for the transmission. Node means any device. End systems mean starting and ending device which are connected to any system. Guaranteed means we used the fixed path. As shown in fig. like red and blue. Call setup required. When call setup have been done, then conservation starts. Normally moves in one specific path..beacuse no sharing. Subnet: It is part of net. e.g class is indivudal and is subnet. And when seminar is held then it will be net.. FDM
  • 6. TDM We divided the fixed line into multiple users. We gives the times to every user that is sepific. Gives times slot to user but if user is not use then it will be lost. Statsical time division multiplexing: In which times slot we can give the user no 4. And at the same times , user no 4 tranmist the 2 mb data. Because user no 3 is replaced with the user no 4. If it is idle. Bursty traffic means in which we transfer the data in huge form. Synchronous , we use the start bit and stop bit. Data is transmitted in th form of bits. And in asynchronous, we use start block and end block. In which data is transfer in the form of byte.