Sunday, May 26, 2019
Hierarchical Databases Essay
There ar four structural types of entropybase management systems hierarchical, cyberspace, relational, and object-oriented.Hierarchical Databases (DBMS), uncouthly used on mainframe computers, have been around for a long time. It is one of the oldest methods of organizing and storing data, and it is still used by some organizations for making travel reservations. Related fields or records are grouped together so that there are higher-level records and lower-level records, bonnie like the parents in a family tree sit above the subordinated tiddlerren. Based on this analogy, the parent record at the top of the pyramid is called the root record. A child record always has only one parent record to which it is colligate, just like in a normal family tree.In contrast, a parent record may have much than one child record linked to it. Hierarchical databases work by moving from the top mickle. A record search is conducted by starting at the top of the pyramid and working down throug h the tree from parent to child until the appropriate child record is found. Furthermore, all(prenominal) child can also be a parent with children underneath it. The advantage of hierarchical databases is that they can be accessed and updated rapidly because the tree-like structure and the relationships between records are defined in advance. Hierarchical databases are so rigid in their design that adding a new field or record requires that the entire database be redefined.Types of DBMS Network DatabasesNetwork databases are similar to hierarchical databases by also having a hierarchical structure. There are a few key differences, however. Instead of looking like an upside-down tree, a network database looks more like a cobweb or interconnected network of records. In network databases, children are called membersand parents are called owners. The around important difference is that each child or member can have more than one parent (or owner). two limitations must be considered wh en using this kind of database. Similar to hierarchical databases, network databases must be defined in advance. There is also a limit to the number of connections that can be made between records.Types of DBMS comparative DatabasesIn relational databases, the relationship between data files is relational, not hierarchical Relational databases connect data in different files by using common data elements or a key field. Data in relational databases is stored in different tables, each having a key field that uniquely identifies each row. Relational databases are more flexible than either the hierarchical or network database structures.Types of DBMS Object-oriented Databases (OODBMS)Able to adhesive friction many new data types, including graphics, photographs, audio, and video, object-oriented databases fiddle a significant advance over their other database cousins. an object-oriented database can be used to store data from a variety of media sources, such as photographs and text, and hold work, as output, in a multimedia format. Object-oriented databases have two disadvantages. First, they are more costly to develop. Second, most organizations are reluctant to abandon or switch over from those databases that they have already invested money in developing and implementing.COMPUTING TYPESCLUSTER COMPUTING clustering means linking together two or more systems to handle variable workloads or to yield continued operation in the event one fails. Each computer may be a multiprocessor system itself. For example, a cluster of four computers, each with two CPUs, would provide a total of eight CPUs processing simultaneously. When clustered, these computers behave like a single computer and are used for load balancing, fault tolerance, and parallel processing.Two or more servers that have been configured in a cluster use a rhythm mechanism to continuously monitor each others health. Each server sends the other an I am OK message at uniform intervals. If several me ssages or heartbeats are missed, it is assumed that a server has failed and the surviving server begins the failover operation. That is, the surviving server assumes the personal identity of the failed server in addition to its identity and recovers and restores the network interfaces, storage connections, and applications. Clients are then reconnected to their applications on the surviving server. The minimum requirements for a server cluster are(a) two servers connected by a network, (b) a method for each server to access the others disk data, and (c) peculiar(prenominal) cluster software like Microsoft Cluster Service (MSCS). The special software provides services such as failure detection, recovery, and the ability to manage the service as a single system. Benefits of Clustering TechnologyAvailability, scalability and to a lesser extent, investment protection and simplified judicature are all touted as benefits from clustering technology. Availability translates into decrease d downtime, scalability translates into flexible growth, and investment protection and simplified administration translate into lowered cost of ownership. Clustered systems bring fault-tolerance and support for rolling upgrades. The most common uses of clustering technique are mission-critical database management, file/intranet data sharing, messaging, and planetary business applications.PARALLEL COMPUTING The nub Passing Interface (MPI) meter provides a common Application Programming Interface (API) for the development of parallel applications careless(predicate) of the type of multiprocessor system used. In the recent past, the Java programming language has made significant inroads as the programming language of choice for the development of a variety of applications in diverse domains.IPV4/IPV6What is Internet Protocol?Internet Protocol is a set of technical rules that defines how computers communicate over a network. There are currently two versions IP version 4 (IPv4) and I P version 6 (IPv6).What is IPv4?IPv4 was the first version of Internet Protocol to be widely used, and accounts for most of todays Internet traffic. There are just over 4 billion IPv4 addresses. While that is a lot of IP addresses, it is not profuse to last forever.What is IPv6?IPv6 is a newer numbering system that provides a much larger address pool than IPv4. It was deployed in 1999 and should meet the worlds IP addressing necessarily well into the future.PROTOCOLSFile Transfer Protocol (FTP) is a standard network communications protocol used to transfer files from one waiter or to another host over a TCP-based network, such as the Internet.The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.1 HTTP is the foundation of data communication for the World encompassing Web. Hypertext is a multi-linear set of objects, building a network by using logical links (the so-called hyperlinks) between the nodes (e. g. text or words). HTTP is the protocol to vary or transfer hypertext. Secure Sockets mould (SSL), are cryptographic protocols that provide communication security over the Internet. SSL encrypt the segments of network connections at the Application Layer for theTransport Layer, using asymmetric cryptography for key exchange, symmetric encryption for confidentiality, and message authentication codes for message integrity.In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e- commit clients to retrieve e- transport from a remote server over a TCP/IPconnection.1 POP and IMAP (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval.2 Virtually all modern e-mail clients and servers support both. The POP protocol has been developed through several versions, with version 3 (POP3) being the current standard. Most webmail service providers such as Hotmail, Gmail and Yahoo Mail al so provide IMAP and POP3 service.Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying.The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this eccentric referred to as datagrams, to other hosts on an Internet Protocol (IP) network without prior communications to set up special transmission channels or data paths. UDP is suitable for purposes where error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.