Distributed control and data sharing , Database Management System

Distributed Control and Data sharing:The geographical distribution of an organization can be showed in the distribution of the data; if a number of different sites are linked to each other, then a user at single site may be able to access data that is available at another site. The main benefit here is that the user does not want the site from which data is being accessed. Data can be placed at the site near to the users who normally use that data. The local control of data permits establishing and enforcement of local policies regarding use of local data. A global database administrator (DBA) is responsible for the whole system. Usually, part of this responsibility is given to the local administrator, so that the local DBA can manage the local DBMS. Therefore in the distributed banking system, it is feasible for a user to get his/her information from any branch office. This external mechanism would, in effect to a user, look to be a one centralised database.

The primary benefit of accomplishing data sharing by means of data distribution is that every site is able to retain a degree of control over data stored locally. Depending upon the design of the distributed database system, every local administrator may have a dissimilar degree of autonomy. This is often a major benefit of distributed databases. In a centralised system, the database administrator of the central site manages the database and, therefore, no local control is possible.

 

Posted Date: 3/12/2013 5:52:41 AM | Location : United States







Related Discussions:- Distributed control and data sharing , Assignment Help, Ask Question on Distributed control and data sharing , Get Answer, Expert's Help, Distributed control and data sharing Discussions

Write discussion on Distributed control and data sharing
Your posts are moderated
Related Questions
Give the limitations of SQL authorization. The code for checking authorization becomes intermixed with the rest of the application code. Implementing authorization by applic

In this programming assignment, you will develop a simple database of student records. Here are the requirements: 1) A student record contains a name and a number. We assume tha

What is Cross Product? Simply Cross product is Binary Operator

What is known as a search key? An attribute or set of attributes used to look up records in a file is known as a search key.

As with other software, databases can potentially be used for unethical purposes. As a database developer, and a consumer, you should recognize database misuse, and how it may affe

Can a filed occur in several field groups. Yes.  But it leads to redundant data redundancy.

Dirty Reads: T10 reads a value which is updated by T9. This update has not been committed and T9 aborts. T9 T10 Value of x old value = 200

What are the various symbols used to draw an E-R diagram? Explain with the help of an example how weak entity sets are represented in an E-R diagram. Various symbols used to d

Evaluate: a.When transactions T1 and T2 are in a deadlock, one of the transactions will eventually implement to completion and let the other one continue implementation. b.

Explain Interfaces for parametric Users? Interfaces for Parametric Users - Parametric users, such as bank tellers, frequent have a little set of operations in which they must p