Vous êtes sur la page 1sur 8

TUTORIAL 5

MOHAMAD NAZIH BIN ISMAIL - 126911


QUESTION 1
Compare and contrast the advantages and disadvantages of a distributed database
management system (DDBMS).
ADVANTAGE
DISADVANTAGE
1. In a distributed database, data can be 1. Since the data is accessed from a remote
stored

in

personal
2.

different

systems

computers,

like system, performance is reduced

servers,

mainframes, etc.
A user doesnt know where the data is 2. Static SQL cannot be used
located physically. Database presents
the data to the user as if it were located

3.

locally
Database

4.

different networks.
distributed database.
Data can be joined and updated from 4. Database optimization is difficult in a

can

be

accessed

over 3. Network traffic is increased in a

different tables which are located on distributed database.


5.

different machines.
Even if a system fails the integrity of 5. Different data formats are used in
the distributed database is maintained.

different systems.

QUESTION 2
List out the components of a DDBMS
Computer workstations or remote devices
Network hardware and software components
Communications media

QUESTION 3
Describe the different types of database requests and transactions.

A remote request accesses data located at a single remote database processor (or DP
site). In other words, an SQL statement (or request) can reference data at only one
remote DP site.
A remote transaction composed of several requests, accesses data at a single remote
site.
A distributed transaction allows a transaction to reference several different local or
remote DP sites. Although each single request can reference only one local or remote
DP site, the complete transaction can reference multiple DP sites because each
request can reference a different site.
A distributed request lets a single SQL statement reference data located at several
different local or remote DP sites. Because each request (SQL statement) can access
data from more than one local or remote DP site, a transaction can access several
sites. The ability to execute a distributed request provides fully distributed database
processing because you can partition a database table into several fragments, and
reference one or more of those fragments with only one request. In other words, there
is fragmentation transparency.
QUESTION 4
Define and explain the different type of distribution transparency
Allows management of physically dispersed database as if centralized
Fragmentation Transparency
Two types of fragmentation are possible: vertical or horizontal fragmentation. A
DDBMS that supports fragmentation transparency makes the user or programmer
unaware that data is fragmented. Therefore, queries and transactions need not specify
fragment names or fragment locations.
Location Transparency
A DDBMS that supports location transparency requires that the user or programmer
specify the names of the fragments but does not need to specify the location
Local Mapping Transparency
A DDBMS that supports local mapping transparency requires that the user or

programmer specify both the name and location of data fragments stored at remote
locations.
QUESTION 5
What are the available data fragmentation strategies? Give some examples of each.
Breaks single object into many segments Information is stored in distributed data catalog
(DDC) Strategies
Horizontal fragmentation: Division of a relation into subsets (fragments) of tuples
(rows)
Vertical fragmentation: Division of a relation into attribute (column) subsets
Mixed fragmentation: Combination of horizontal and vertical strategies
QUESTION 6
What is data replication and what are the three replication strategies
Database replication is the frequent electronic copying data from a database in one
computer or server to a database in another so that all users share the same level of
information. The result is a distributed database in which users can access data relevant to
their tasks without interfering with the work of others. The implementation of database
replication for the purpose of eliminating data ambiguity or inconsistency among users is
known as normalization
Database replication can be done in at least three different ways:
Snapshot replication: Data on one server is simply copied to another server, or to
another database on the same server.
Merging replication: Data from two or more databases is combined into a single
database.
Transactional replication: Users receive full initial copies of the database and then
receive periodic updates as data changes.
QUESTION 7

Specify the minimum types of operations the database must support (e.g. remote
request, remote transaction, distributed request or distributed transaction) to
perform the following operations.
Site
At Site C

Operation
SELECT * FROM

Type
Remote request

CUSTOMER;
SELECT * FROM

Remote request

INVOICE WHERE
INV_TOT >
1000;
SELECT * FROM

Distributed request

PRODUCT WHERE
PROD_QOH <
10;
BEGIN WORK;
UPDATE CUSTOMER
SET CUS_BAL =
CUS_BAL +
100 WHERE CUS_NUM =
10936;
INSERT INTO INVOICE
(INV_NUM, CUS_NUM,
INV_DATE, INV_TOTAL)
VALUES (986391,
10936, 15-FEB-2010,
100);
INSERT INTO
INV_LINE(INV_NUM,
PROD_NUM,
LINE_PRICE) VALUES
(986391, 1023, 100);

Distributed transaction

UPDATE PRODUCT SET


PROD_QOH =
PROD_QOH 1 WHERE
PROD_NUM = 1023;
COMMIT WORK;
BEGIN WORK;

Distributed transaction

INSERT INTO
CUSTOMER (CUS_NUM,
CUS_NAME,
CUS_ADDRESS,
CUS_BAL) VALUES
(34210, Victor Ephanor,
123 Main St., 0.00);
INSERT INTO INVOICE
(INV_NUM, CUS_NUM,
INV_DATE, INV_TOTAL)
VALUES (986434,
34210, 10-AUG-2009,
2.00);
At Site A

COMMIT WORK;
SELECT CUS_NUM,

Distributed request

CUS_NAME, INV_TOTAL
FROM CUSTOMER,
INVOICE WHERE
CUSTOMER.CUS_NUM =
INVOICE.CUS_NUM;
SELECT * FROM

Remote request

INVOICE WHERE
INV_TOT >
1000
SELECT * FROM
PRODUCT WHERE

Distributed request

PROD_QOH <
At Site B

10;
SELECT * FROM

Remote request

CUSTOMER;
SELECT CUS_NAME,

Distributed request

INV_TOTAL FROM
CUSTOMER, INVOICE
WHERE INV_TOTAL >
1000
AND
CUSTOMER.CUS_NUM =
INVOICE.CUS_NUM;
SELECT * FROM

Distributed request

PRODUCT WHERE
PROD_QOH <
10;
QUESTION 8
Define security and privacy. How are these two concepts related

QUESTION 9
What are security vulnerabilities? What is a security threat? Give some examples of
security vulnerabilities that exist in different IS components
Security vulnerability is a weakness in a system component that could be exploited to
allow unauthorized access or cause service disruptions. Such vulnerabilities could fall

underone of the following categories:


Technical. An example would be a flaw in the operating system or web browser.
Managerial. For example, an organization might not educate users about critical
security issues.
Cultural. Users might hide passwords under their keyboards or forget to shred
confidential reports.
Procedural. Company procedures might not require complex passwords or the
checking ofuser IDs.
When a security vulnerability is left unchecked, it could become a security threat, which
is animminent security violation
QUESTION 10
List out the technical role of a database administrator (DBA).
Installing and upgrading the database server and application tools
Allocating system storage and planning future storage requirements for the database
system
Modifying the database structure, as necessary, from information given by
application developers
Enrolling users and maintaining system security
Ensuring compliance with database vendor license agreement
Controlling and monitoring user access to the database
Monitoring and optimizing the performance of the database

QUESTION 11
Discuss the significance and characteristics of database backup and recovery
procedures. Also, describe the actions that must be detailed in backup and recovery
plans.

Database backup is crucial to the continued availability of the database system after a
database or hardware failure has occurred. Database backup and recovery procedures
must include the information necessary to guarantee proper execution and management of
the backups. There are several types of backup
Full backup/dump: All database objects are backed up in their entirety
Differential backup: Only modified/updated objects since last full backup are backed
up
Transaction log backup: Only the transaction log operations that are not reflected in a
previous backup are backed up

Vous aimerez peut-être aussi