SlideShare une entreprise Scribd logo
1  sur  9
1. Accès direct

                   Base BIG




    Accès direct




 Application BIG
1. Accès direct

                                      Base BIG




                       Accès direct               Accès direct




                    Application BIG              Application BIG




•  Volume des échanges de données
•  Conflit des accès concurrentiels
=> Montée en charge limitée
1. Accès H2 direct (H2_FS)
                                                Base H2 BIG

                                                                           big.lock.db
                                          #FileLock
                                          #Fri Jun 15 17:21:34 CEST 2012
                                          id=137f0bc272786623f7a5d61ae5bac67bbaac5eca314
                                          logPos=713184
                                          method=serialized
                       big.h2.db




                   Interrogation big .lock.db                          Interrogation big .lock.db
                               &                                                   &
                          Accès direct                                        Accès direct




                       Application BIG                                Application BIG




• Volume des échanges de données
• Conflit des accès concurrentiels
=> Montée en charge limitée
2. Accès H2 par défaut
                                                     Base H2 BIG




                             big.h2.db




                        Interrogation big .lock.db




                             Application BIG


                                172.18.12.102



Principes :
b)   Le premier client H2…
2. Accès H2 par défaut
                                                      Base H2 BIG

                                                                                  big.lock.db
                                                 #FileLock
                                                 #Wed Jun 13 14:48:04 CEST 2012
                                                 id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e
                                                 method=file
                                                 server=172.18.12.102:53053
                             big.h2.db




                                  Accès direct




                            Application BIG

                            Serveur H2 (port 53053)

                                172.18.12.102



Principes :
b)   Le premier client H2 utilise un accès direct et expose automatiquement un
     serveur H2
2. Accès H2 par défaut
                                                      Base H2 BIG

                                                                                  big.lock.db
                                                 #FileLock
                                                 #Wed Jun 13 14:48:04 CEST 2012
                                                 id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e
                                                 method=file
                                                 server=172.18.12.102:53053
                             big.h2.db




                                  Accès direct                                 Interrogation big .lock.db




                            Application BIG                                  Application BIG

                            Serveur H2 (port 53053)

                                172.18.12.102



Principes :
b)   Le premier client H2 utilise un accès direct et expose automatiquement un
     serveur H2
c)   Les clients H2 suivants…
2. Accès H2 par défaut
                                                      Base H2 BIG

                                                                                  big.lock.db
                                                 #FileLock
                                                 #Wed Jun 13 14:48:04 CEST 2012
                                                 id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e
                                                 method=file
                                                 server=172.18.12.102:53053
                             big.h2.db




                                  Accès direct




                            Application BIG                                  Application BIG
                                                           Accès TCP
                            Serveur H2 (port 53053)

                                172.18.12.102



Principes :
b)   Le premier client H2 utilise un accès direct et expose automatiquement un
     serveur H2
c)   Les clients H2 suivants se connectent au serveur H2 créé
2. Accès H2 par défaut
                                                 Base H2 BIG

                                                                             big.lock.db
                                            #FileLock
                                            #Wed Jun 13 14:48:04 CEST 2012
                                            id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e
                                            method=file
                                            server=172.18.12.102:53053
                        big.h2.db




                             Accès direct




                       Application BIG                                  Application BIG
                                                      Accès TCP
                       Serveur H2 (port 53053)

                           172.18.12.102




•   Performances optimales pour poste autonome
•   Meilleure gestion de la bande passante et des accès concurrents
•   Premier client BIG doit disposer d’un bon accès à la base et aux
    autres clients (qui doivent aussi accéder à la base pour lire
    big.lock.db)
3. Accès H2 serveur (H2_TCP)
                                         Base H2 BIG

                                                                        big.lock.db
                                    #FileLock
                                    #Wed Jun 13 14:48:04 CEST 2012
                                    id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e
                                    method=file


                       big.h2.db


                                    Accès direct

                                         Serveur H2 (port 53053)   172.18.12.102




                                             Accès TCP




                       Application BIG                             Application BIG




•    Accès optimal
•    Contrôle centralisé des accès ; base pouvant être inaccessible
     en direct par les clients
•    Administration minimale (automatisable)

Contenu connexe

En vedette

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

En vedette (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

BIG - base partagée

  • 1. 1. Accès direct Base BIG Accès direct Application BIG
  • 2. 1. Accès direct Base BIG Accès direct Accès direct Application BIG Application BIG • Volume des échanges de données • Conflit des accès concurrentiels => Montée en charge limitée
  • 3. 1. Accès H2 direct (H2_FS) Base H2 BIG big.lock.db #FileLock #Fri Jun 15 17:21:34 CEST 2012 id=137f0bc272786623f7a5d61ae5bac67bbaac5eca314 logPos=713184 method=serialized big.h2.db Interrogation big .lock.db Interrogation big .lock.db & & Accès direct Accès direct Application BIG Application BIG • Volume des échanges de données • Conflit des accès concurrentiels => Montée en charge limitée
  • 4. 2. Accès H2 par défaut Base H2 BIG big.h2.db Interrogation big .lock.db Application BIG 172.18.12.102 Principes : b) Le premier client H2…
  • 5. 2. Accès H2 par défaut Base H2 BIG big.lock.db #FileLock #Wed Jun 13 14:48:04 CEST 2012 id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e method=file server=172.18.12.102:53053 big.h2.db Accès direct Application BIG Serveur H2 (port 53053) 172.18.12.102 Principes : b) Le premier client H2 utilise un accès direct et expose automatiquement un serveur H2
  • 6. 2. Accès H2 par défaut Base H2 BIG big.lock.db #FileLock #Wed Jun 13 14:48:04 CEST 2012 id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e method=file server=172.18.12.102:53053 big.h2.db Accès direct Interrogation big .lock.db Application BIG Application BIG Serveur H2 (port 53053) 172.18.12.102 Principes : b) Le premier client H2 utilise un accès direct et expose automatiquement un serveur H2 c) Les clients H2 suivants…
  • 7. 2. Accès H2 par défaut Base H2 BIG big.lock.db #FileLock #Wed Jun 13 14:48:04 CEST 2012 id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e method=file server=172.18.12.102:53053 big.h2.db Accès direct Application BIG Application BIG Accès TCP Serveur H2 (port 53053) 172.18.12.102 Principes : b) Le premier client H2 utilise un accès direct et expose automatiquement un serveur H2 c) Les clients H2 suivants se connectent au serveur H2 créé
  • 8. 2. Accès H2 par défaut Base H2 BIG big.lock.db #FileLock #Wed Jun 13 14:48:04 CEST 2012 id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e method=file server=172.18.12.102:53053 big.h2.db Accès direct Application BIG Application BIG Accès TCP Serveur H2 (port 53053) 172.18.12.102 • Performances optimales pour poste autonome • Meilleure gestion de la bande passante et des accès concurrents • Premier client BIG doit disposer d’un bon accès à la base et aux autres clients (qui doivent aussi accéder à la base pour lire big.lock.db)
  • 9. 3. Accès H2 serveur (H2_TCP) Base H2 BIG big.lock.db #FileLock #Wed Jun 13 14:48:04 CEST 2012 id=137e5e2f2ab803cf71b6b520b7b008b17e3e75e3a9e method=file big.h2.db Accès direct Serveur H2 (port 53053) 172.18.12.102 Accès TCP Application BIG Application BIG • Accès optimal • Contrôle centralisé des accès ; base pouvant être inaccessible en direct par les clients • Administration minimale (automatisable)