Professional Documents
Culture Documents
Since irrelevant data is not available at the sites, security and privacy of
the database system can be maintained
Disadvantages of Fragmentation
When data from different fragments are required, the access speeds may
be very high.
Lack of back-up copies of data in different sites may render the database
ineffective in case of failure of a site.
Vertical Fragmentation
EXAMPLE
Now, the fees details are maintained in the accounts section. In this case,
the designer will fragment the database as follows −
CREATE COMP_STD AS
SELECT * FROM STUDENT
WHERE COURSE = "Computer Science";
Hybrid Fragmentation
In hybrid fragmentation, fragmentation, a combination of horizontal and
vertical fragmentation mentation techniques are used.
This is the most flexible fragmentation technique since it generates fragments
with minimal extraneous information.
However, reconstruction of the original table is often an expensive task.
Hybrid fragmentation can be done in two alternative ways −
At first, generate a set of horizontal fragments; fragments; then generate
vertical fragments from one or more of the horizontal fragments.
At first, generate a set of vertical fragments; fragments; then generate
horizontal fragments from one or more of the vertical fragments.
Determination of Fragment
The non-redundant best-fit method determines the single most likely site
to allocate a fragment based on maximum benefit.
EXAMPLE
Normally these rules are entered by the end user or database administrator,
and often they are very general in nature.
Overview of Concurrency Control
and Recovery
Concurrency control is very important in the distributed database
environment because once we are using many sites and operations are
involving many processes the possibility of data inconsistency and
deadlocked transactions becomes much greater.
Most of them work by extending techniques used for
centralized databases in some way.‹ E.g. If we restrict ourselves to the
concurrency control technique of centralized locking we can extend that to
the distributed case by designating one copy of the database as a distinguished
copy and then applying our locking protocols to that copy.
Client/Server Architecture
Databases built on the client-server architecture are quite common, so it is useful to review that
architecture and how it applies to the field of databases.
Review of Client-Server
Architecture
The client is any computer process that requests services from the
server.
The client is also known as the Front-end Application.
Server
The client application or front end, runs on top of the operating system
and connects with the middleware to access services available in the
network.
Remote Procedure Call (RPC) is a protocol that one program can use to
request a service from a program located in another computer on a network
without having to understand the network's details.
A procedure call is also sometimes known as a function call or a subroutine
call.
RPC-based middleware is probably most suited to highly integrated systems
in which data integrity is critical, as well as high-throughput networks.
Object-based Middleware