Distributed data processing, Computer Networking

In distributed data processing, explain two scenarios where vertical partitioning and horizontal partitioning are used.

Distributed Data Processing

The distributed data processing is an arrangement of networked computers in which data processing capabilities are spread across the network. In Distributed data processing several client computers shares the same server. The following are some of the features of Distributed Data Processing

 1. In Distributed Data Processing computers installed at different sites .

2. Each computer in Distributed Data Processing performs independent data processing 

3. Each computer in Distributed Data Processing is specialized to perform wide range of activities.

Horizontal Partitioning

In Horizontal Partitioning, Different applications run on different Systems. The one application replicated on different systems. For Example: Office Automation is used to store office information, raw data storage, electronic transfer, and the management of electronic business information comprises the basic activities of an office. Office automation helps in optimizing or automating existing office procedures. The backbone of office automation is a LAN, which allows users to transmit data, mail and even voice across the network.

Vertical Partitioning:

In vertical partitioning one application is distributed among different systems. For example: Retail chain where some of the restaurants have the chain system etc.

Posted Date: 7/10/2012 8:36:37 AM | Location : United States







Related Discussions:- Distributed data processing, Assignment Help, Ask Question on Distributed data processing, Get Answer, Expert's Help, Distributed data processing Discussions

Write discussion on Distributed data processing
Your posts are moderated
Related Questions
Q. Describe Physical Layer in OSI layers model? Physical Layer : Controls the transmission of the actual data onto the network. It describes the electrical signals, line state

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol

Question 1 Discuss the benefits and requirements of VOIP Question 2 Define the following Multicast routing protocol explain in detail with diagram Multicast backbone

What is the client side of applications To build the client side of applications, developers use various tools. Some of the popular software development environments include Vi

Memory Pools IOS manages available free memory thorugh  memory pool series, which are essentially heaps in the generic sense; each pool is a set of memory blocks that can be al

How does dynamic host configuration protocol aid in network administration? Instead of having to visit every client computer to configure a static IP address, the network admin

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

Q. Show a simplex Stop and Wait automatic repeat request? A simplex Stop and Wait ARQ - Normal Operation - Frame lost - Acknowledgement lost - Acknowledgement de

State about the Packet filter firewalls They remain the most common type of firewall in use as of today. They were the earliest firewalls developed and were capable of permitt