SlideShare a Scribd company logo
DISTRIBUTED
DATABASE
WHAT IS DISTRIBUTED DATABASE?
• A distributed database (DDB) is a collection of multiple, logically
interrelated databases distributed over a computer network.
• A distributed database management system (DDBMS) is the
software that manages the DDB and provides an access mechanism
that makes this distribution transparent to the users
CHARACTERISTICS
• All sites are interconnected.
• Fragments can be replicated.
• Logically related shared data can be collected.
• Data at each and every site is controlled by the DBMS.
• Each Distributed Database Management System takes part in at
least one global application.
FUNCTIONALITY
• Security
• Keeping track of data
• Replicated data management
• System catalog management
• Distributed transaction management
• Distributed database recovery
A DDBMS MAINLY CLASSIFIED INTO TWO TYPES:
• Homogeneous Distributed database management systems
• Heterogeneous Distributed database management systems
HOMOGENEOUS DDBMS
• In a homogeneous distributed database all sites have identical
software and are aware of each other and agree to cooperate in
processing user requests.
• The homogeneous system is much easier to design and manage.
• The operating system used, at each location must be same or
compatible.
• The database application (or DBMS) used at each location must be
same or compatible.
HETEROGENEOUS DDBMS
• In a heterogeneous distributed database different sites may use different schema and software.
• In heterogeneous systems, different nodes may have different hardware & software and data
structures at various nodes or locations are also incompatible.
• Different computers and operating systems, database applications or data models may be used
at each of the locations.
• On heterogeneous system, translations are required to allow communication between different
sites (or DBMS).
• The heterogeneous system is often not technically or economically feasible. In this system, a
user at one location may be able to read but not update the data at another location.
ADVANTAGES
• Less danger of a single-point failure. When one of the computers fails, the workload is picked up
by other workstations.
• Data are also distributed at multiple sites.
• The end user is able to access any available copy of the data, and an end user's request is
processed by any processor at the data location.
• Improved communications. Because local sites are smaller and located closer to customers.
• Reduced operating costs. It is more cost- effective to add workstations to a network than to
update a mainframe system.
• Faster data access, faster data processing.
• A distributed database system spreads out the systems workload by processing data at several
sites.
DISADVANTAGES
• Complexity of management and control.
• Applications must recognize data location, and they must be able to stitch
together data from various sites.
• Security.
• Increased storage and infrastructure requirements.
• Multiple copies of data has to be at different sites, thus an additional disk
storage space will be required.
• The probability of security lapses increases when data are located at multiple
sites.
WHAT IS PARALLEL DATABASE
• A parallel database system is to improve performance through parallelization of
various operations, such as loading data, building indexes and evaluating queries.
• The distribution is solely done on the bases of performance.
• Parallel databases improve processing and input/output speeds by using
multiple CPUs and disks in parallel.
• Many operations are performed simultaneously.
• Data may be stored in a distributed fashion.
DISTRIBUTED DATABASE VS PARALLEL DATABASE
Characteristics Parallel Database Distributed database
Definition It is a software system where
multiple processors or
machines are used to execute
and run queries in parallel.
It is a software system that
manages multiple logically
interrelated databases
distributed over a computer
network
Geographical Location The nodes are located at
geographically same location.
The nodes are usually
located at geographically
different locations.
Execution Speed Quicker Slower
Overhead Less More
Node types Compulsorily Homogeneous Need not be homogeneous
Performance Lower reliability & availability. Higher reliability &
availability
Scope of Expansion Difficult to expand Easier to expand
Backup Backup at one site only Backup at multiple sites
Consistency Maintaining consistency is
easier
Maintaining consistency is
difficult.
DATA FRAGMENTATION
• Fragmentation is a process of division or the mapping of the tables based on the
columns and rows of data into the smallest unit of data.
• Data that has broken down is still possible to be combined again with the
intention to complete the data collection using fragmentation.
• Fragmentation is a database server feature that allows you to control where data
is stored at the table level.
• Fragmentation enables you to define groups of rows or index keys within a table.
REPLICATION
• Replication is that we store several copies of a relation or relation fragment. An
entire relation can be replicated at one or more sites.
• Similarly, one or more fragments of a relation can be replicated at other sites.
• For example, if a relation R is fragmented into R1,R2, and R3, there might be just
one copy of R1, whereas R2 is replicated at two other sites and R3 is replicated at
all sites.
TWO FOLD REPLICATION
• The motivation for replication is twofold:
• Increased Availability of Data: fa site that contains a replica goes down, we can
find the same data at other sites. Similarly, if local copies of remote relations are
available, we are less vulnerable to failure of communication links.
• Faster Query Evaluation: Queries can execute faster by using a local copy of a
relation instead of going to a remote site.
DISTRIBUTED TRANSACTION
• In a distributed DBMS, a given transaction is submitted at some one site, but it can
access data at other sites as well. When a transaction is submitted at some site, the
transaction manager at that site breaks it up into a collection of one or more sub-
transactions that execute at different sites, submits them to transaction managers at
the other sites, and coordinates their activity.
• Distributed Concurrency Control: How can locks for objects stored across several sites
be managed?
• Distributed Recovery: Transaction atomicity must be ensured when a transaction
commits, all its actions, across all the sites at which it executes, must persist. Similarly,
when a transaction aborts, none of its actions must be allowed to persist.
DISTRIBUTED CONCURRENCY CONTROL
• The choice of technique determines which objects are to be locked.
• When locks are obtained and released is determined by the concurrency control
protocol.
• We now consider how lock and unlock requests are implemented in a distributed
environment.
• Lock management can be distributed across sites in many ways:
• Centralized : A single site is in charge of handling lock and unlock requests for
all objects.
• Primary Copy: One copy of each object is designated the primary copy. All
requests to lock or unlock a copy of this object are handled by the lock manager
at the site where the primary copy is stored, regardless of where the copy itself
stored.
• Fully Distributed : Requests to lock or unlock a copy of an object stored at a site
are handled by the lock manager at the site where the copy is stored.
DISTRIBUTED RECOVERY
• Recovery in a distributed DBMS is more complicated than in a centralized DBMS
for the following reasons:
• New kinds of failure can arise : Failure of communication links and failure of a
remote site at which a sub-transaction is executing.
• Either all sub-transactions of a given transaction must commit or none must
commit, and this property must be guaranteed despite any combination of site
and link failures. This guarantee is achieved using a commit protocol.
CONCEPTS OF LOCKS
• A lock is used when multiple users need to access a database concurrently. This
prevents data from being corrupted or invalidated when multiple users try to
write to the database.
• Any single user can only modify those database records (that is, items in the
database) to which they have applied a lock that gives them exclusive access to
the record until the lock is released.
• Locking not only provides exclusivity to write but also prevents (or controls)
reading of unfinished modifications.

More Related Content

Similar to lecture-13.pptx

Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptxSantosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
SANTOSH KUMAR MEHER
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song songLê Anh Trung
 
Distributed database management system
Distributed database management systemDistributed database management system
Distributed database management system
Vinay D. Patel
 
distributed database management system.ppt
distributed database management system.pptdistributed database management system.ppt
distributed database management system.ppt
ssuserf170c4
 
AdvanceDatabaseChapter6Advance Dtabases.pptx
AdvanceDatabaseChapter6Advance Dtabases.pptxAdvanceDatabaseChapter6Advance Dtabases.pptx
AdvanceDatabaseChapter6Advance Dtabases.pptx
XanGwaps
 
Distributed dbms (ddbms)
Distributed dbms (ddbms)Distributed dbms (ddbms)
Distributed dbms (ddbms)
JoylineChepkirui
 
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
raghdooosh
 
ditributed databases
ditributed databasesditributed databases
ditributed databases
Hira Awan
 
Database SystemsDesign, Implementation, and Management
Database SystemsDesign, Implementation, and ManagementDatabase SystemsDesign, Implementation, and Management
Database SystemsDesign, Implementation, and Management
OllieShoresna
 
1 introduction DDBS
1 introduction DDBS1 introduction DDBS
1 introduction DDBS
naimanighat
 
Database , 1 Introduction
 Database , 1 Introduction Database , 1 Introduction
Database , 1 IntroductionAli Usman
 
Database replication
Database replicationDatabase replication
Database replication
Arslan111
 
Transforming centralized into distributed
Transforming centralized into distributedTransforming centralized into distributed
Transforming centralized into distributed
Health and wealth organization
 
HDFS_architecture.ppt
HDFS_architecture.pptHDFS_architecture.ppt
HDFS_architecture.ppt
vijayapraba1
 
Chapter-6 Distribute Database system (3).ppt
Chapter-6 Distribute Database system (3).pptChapter-6 Distribute Database system (3).ppt
Chapter-6 Distribute Database system (3).ppt
latigudata
 
distributed system original.pdf
distributed system original.pdfdistributed system original.pdf
distributed system original.pdf
KirimanyiJovanntanda
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
Pooja Dixit
 
Adbms 31 data distribution transparency
Adbms 31 data distribution transparencyAdbms 31 data distribution transparency
Adbms 31 data distribution transparency
Vaibhav Khanna
 

Similar to lecture-13.pptx (20)

Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptxSantosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
Santosh Kumar Meher(2105040008) DISTRIBUTED DATABASE.pptx
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song song
 
Distributed database management system
Distributed database management systemDistributed database management system
Distributed database management system
 
distributed database management system.ppt
distributed database management system.pptdistributed database management system.ppt
distributed database management system.ppt
 
AdvanceDatabaseChapter6Advance Dtabases.pptx
AdvanceDatabaseChapter6Advance Dtabases.pptxAdvanceDatabaseChapter6Advance Dtabases.pptx
AdvanceDatabaseChapter6Advance Dtabases.pptx
 
Distributed dbms (ddbms)
Distributed dbms (ddbms)Distributed dbms (ddbms)
Distributed dbms (ddbms)
 
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
 
ditributed databases
ditributed databasesditributed databases
ditributed databases
 
Database SystemsDesign, Implementation, and Management
Database SystemsDesign, Implementation, and ManagementDatabase SystemsDesign, Implementation, and Management
Database SystemsDesign, Implementation, and Management
 
1 introduction DDBS
1 introduction DDBS1 introduction DDBS
1 introduction DDBS
 
Distributed dbms
Distributed dbmsDistributed dbms
Distributed dbms
 
Database , 1 Introduction
 Database , 1 Introduction Database , 1 Introduction
Database , 1 Introduction
 
Database replication
Database replicationDatabase replication
Database replication
 
Transforming centralized into distributed
Transforming centralized into distributedTransforming centralized into distributed
Transforming centralized into distributed
 
HDFS_architecture.ppt
HDFS_architecture.pptHDFS_architecture.ppt
HDFS_architecture.ppt
 
Chapter-6 Distribute Database system (3).ppt
Chapter-6 Distribute Database system (3).pptChapter-6 Distribute Database system (3).ppt
Chapter-6 Distribute Database system (3).ppt
 
distributed system original.pdf
distributed system original.pdfdistributed system original.pdf
distributed system original.pdf
 
DDMS
DDMSDDMS
DDMS
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
Adbms 31 data distribution transparency
Adbms 31 data distribution transparencyAdbms 31 data distribution transparency
Adbms 31 data distribution transparency
 

More from laiba29012

1610374430-week15b.pptx
1610374430-week15b.pptx1610374430-week15b.pptx
1610374430-week15b.pptx
laiba29012
 
Lec4.ppt
Lec4.pptLec4.ppt
Lec4.ppt
laiba29012
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptx
laiba29012
 
Lecture-6(a-b).pptx
Lecture-6(a-b).pptxLecture-6(a-b).pptx
Lecture-6(a-b).pptx
laiba29012
 
Access Methods and File System Mounting.pptx
Access Methods and File System Mounting.pptxAccess Methods and File System Mounting.pptx
Access Methods and File System Mounting.pptx
laiba29012
 
Database queries
Database queriesDatabase queries
Database queries
laiba29012
 
OS memory management
OS memory management OS memory management
OS memory management
laiba29012
 
executive summary ppt ent.pptx
executive summary ppt ent.pptxexecutive summary ppt ent.pptx
executive summary ppt ent.pptx
laiba29012
 
GYM SERVICES.pptx
GYM SERVICES.pptxGYM SERVICES.pptx
GYM SERVICES.pptx
laiba29012
 

More from laiba29012 (9)

1610374430-week15b.pptx
1610374430-week15b.pptx1610374430-week15b.pptx
1610374430-week15b.pptx
 
Lec4.ppt
Lec4.pptLec4.ppt
Lec4.ppt
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptx
 
Lecture-6(a-b).pptx
Lecture-6(a-b).pptxLecture-6(a-b).pptx
Lecture-6(a-b).pptx
 
Access Methods and File System Mounting.pptx
Access Methods and File System Mounting.pptxAccess Methods and File System Mounting.pptx
Access Methods and File System Mounting.pptx
 
Database queries
Database queriesDatabase queries
Database queries
 
OS memory management
OS memory management OS memory management
OS memory management
 
executive summary ppt ent.pptx
executive summary ppt ent.pptxexecutive summary ppt ent.pptx
executive summary ppt ent.pptx
 
GYM SERVICES.pptx
GYM SERVICES.pptxGYM SERVICES.pptx
GYM SERVICES.pptx
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

lecture-13.pptx

  • 2. WHAT IS DISTRIBUTED DATABASE? • A distributed database (DDB) is a collection of multiple, logically interrelated databases distributed over a computer network. • A distributed database management system (DDBMS) is the software that manages the DDB and provides an access mechanism that makes this distribution transparent to the users
  • 3.
  • 4. CHARACTERISTICS • All sites are interconnected. • Fragments can be replicated. • Logically related shared data can be collected. • Data at each and every site is controlled by the DBMS. • Each Distributed Database Management System takes part in at least one global application.
  • 5. FUNCTIONALITY • Security • Keeping track of data • Replicated data management • System catalog management • Distributed transaction management • Distributed database recovery
  • 6. A DDBMS MAINLY CLASSIFIED INTO TWO TYPES: • Homogeneous Distributed database management systems • Heterogeneous Distributed database management systems
  • 7. HOMOGENEOUS DDBMS • In a homogeneous distributed database all sites have identical software and are aware of each other and agree to cooperate in processing user requests. • The homogeneous system is much easier to design and manage. • The operating system used, at each location must be same or compatible. • The database application (or DBMS) used at each location must be same or compatible.
  • 8. HETEROGENEOUS DDBMS • In a heterogeneous distributed database different sites may use different schema and software. • In heterogeneous systems, different nodes may have different hardware & software and data structures at various nodes or locations are also incompatible. • Different computers and operating systems, database applications or data models may be used at each of the locations. • On heterogeneous system, translations are required to allow communication between different sites (or DBMS). • The heterogeneous system is often not technically or economically feasible. In this system, a user at one location may be able to read but not update the data at another location.
  • 9. ADVANTAGES • Less danger of a single-point failure. When one of the computers fails, the workload is picked up by other workstations. • Data are also distributed at multiple sites. • The end user is able to access any available copy of the data, and an end user's request is processed by any processor at the data location. • Improved communications. Because local sites are smaller and located closer to customers. • Reduced operating costs. It is more cost- effective to add workstations to a network than to update a mainframe system. • Faster data access, faster data processing. • A distributed database system spreads out the systems workload by processing data at several sites.
  • 10. DISADVANTAGES • Complexity of management and control. • Applications must recognize data location, and they must be able to stitch together data from various sites. • Security. • Increased storage and infrastructure requirements. • Multiple copies of data has to be at different sites, thus an additional disk storage space will be required. • The probability of security lapses increases when data are located at multiple sites.
  • 11. WHAT IS PARALLEL DATABASE • A parallel database system is to improve performance through parallelization of various operations, such as loading data, building indexes and evaluating queries. • The distribution is solely done on the bases of performance. • Parallel databases improve processing and input/output speeds by using multiple CPUs and disks in parallel. • Many operations are performed simultaneously. • Data may be stored in a distributed fashion.
  • 12. DISTRIBUTED DATABASE VS PARALLEL DATABASE Characteristics Parallel Database Distributed database Definition It is a software system where multiple processors or machines are used to execute and run queries in parallel. It is a software system that manages multiple logically interrelated databases distributed over a computer network Geographical Location The nodes are located at geographically same location. The nodes are usually located at geographically different locations. Execution Speed Quicker Slower Overhead Less More
  • 13. Node types Compulsorily Homogeneous Need not be homogeneous Performance Lower reliability & availability. Higher reliability & availability Scope of Expansion Difficult to expand Easier to expand Backup Backup at one site only Backup at multiple sites Consistency Maintaining consistency is easier Maintaining consistency is difficult.
  • 14. DATA FRAGMENTATION • Fragmentation is a process of division or the mapping of the tables based on the columns and rows of data into the smallest unit of data. • Data that has broken down is still possible to be combined again with the intention to complete the data collection using fragmentation. • Fragmentation is a database server feature that allows you to control where data is stored at the table level. • Fragmentation enables you to define groups of rows or index keys within a table.
  • 15. REPLICATION • Replication is that we store several copies of a relation or relation fragment. An entire relation can be replicated at one or more sites. • Similarly, one or more fragments of a relation can be replicated at other sites. • For example, if a relation R is fragmented into R1,R2, and R3, there might be just one copy of R1, whereas R2 is replicated at two other sites and R3 is replicated at all sites.
  • 16. TWO FOLD REPLICATION • The motivation for replication is twofold: • Increased Availability of Data: fa site that contains a replica goes down, we can find the same data at other sites. Similarly, if local copies of remote relations are available, we are less vulnerable to failure of communication links. • Faster Query Evaluation: Queries can execute faster by using a local copy of a relation instead of going to a remote site.
  • 17. DISTRIBUTED TRANSACTION • In a distributed DBMS, a given transaction is submitted at some one site, but it can access data at other sites as well. When a transaction is submitted at some site, the transaction manager at that site breaks it up into a collection of one or more sub- transactions that execute at different sites, submits them to transaction managers at the other sites, and coordinates their activity. • Distributed Concurrency Control: How can locks for objects stored across several sites be managed? • Distributed Recovery: Transaction atomicity must be ensured when a transaction commits, all its actions, across all the sites at which it executes, must persist. Similarly, when a transaction aborts, none of its actions must be allowed to persist.
  • 18. DISTRIBUTED CONCURRENCY CONTROL • The choice of technique determines which objects are to be locked. • When locks are obtained and released is determined by the concurrency control protocol. • We now consider how lock and unlock requests are implemented in a distributed environment. • Lock management can be distributed across sites in many ways:
  • 19. • Centralized : A single site is in charge of handling lock and unlock requests for all objects. • Primary Copy: One copy of each object is designated the primary copy. All requests to lock or unlock a copy of this object are handled by the lock manager at the site where the primary copy is stored, regardless of where the copy itself stored. • Fully Distributed : Requests to lock or unlock a copy of an object stored at a site are handled by the lock manager at the site where the copy is stored.
  • 20. DISTRIBUTED RECOVERY • Recovery in a distributed DBMS is more complicated than in a centralized DBMS for the following reasons: • New kinds of failure can arise : Failure of communication links and failure of a remote site at which a sub-transaction is executing. • Either all sub-transactions of a given transaction must commit or none must commit, and this property must be guaranteed despite any combination of site and link failures. This guarantee is achieved using a commit protocol.
  • 21. CONCEPTS OF LOCKS • A lock is used when multiple users need to access a database concurrently. This prevents data from being corrupted or invalidated when multiple users try to write to the database. • Any single user can only modify those database records (that is, items in the database) to which they have applied a lock that gives them exclusive access to the record until the lock is released. • Locking not only provides exclusivity to write but also prevents (or controls) reading of unfinished modifications.