PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING Subject:

EL-III Advanced Databases

Class: BE Computer

University Questions: Unit II – Distributed Databases 1.

Explain the two phase commit protocol handle the following failures

8

1> Network partition 2>Failure of a participating site 2

What is meant by Persistent messaging? Explain.

6

3

Explain the notions of transparency and autonomy. Why are these notions desirable from a human-factor stand point?

4

4

Mention different concurrency control schemes in distributed database. Explain any two.

8

5

Explain lazy propagation.

4

6

When is it useful to have replication or fragmentation of data? Explain your answer.

6

7 Consider a relation that is fragmented horizontally by a plant-number.

8

employee(name, address, salary, plant-number). Assume that each fragment has two replicas : One stored at New York Site & other at plant site. Describe a good processing strategy for the following queries entered at San Jose site.

8

i.)

Find the average salary of employees.

ii.)

Find the highest paid employee at Toronoto site.

iii.)

Find the lowest paid employee in company.

Explain 2-phase commit protocol & 3-phase commit protocol. State their differences. 9 What are different locking protocols in distributed database? Explain two of them?

8

Ans. If we are to ensure atomicity, all the sites in which a transaction T executed must agree on the final outcome of the execution. T must either commit at all sites, or it must abort at all sites. To ensure this property, the transaction coordinator of T must execute a commit protocol. Among the simplest and most widely used commit protocols is the two-phase commit protocol (2PC. An alternative is the three-phase commit protocol (3PC), which avoids certain disadvantages of the 2PC protocol but adds to complexity and overhead. 1) Two-Phase Commit 2012-13

Unit II: Distributed Databases

8

1

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING Subject:

EL-III Advanced Databases

Class: BE Computer

University Questions: Unit II – Distributed Databases We first describe how the two-phase commit protocol (2PC) operates during normal operation, then describe how it handles failures and finally how it carries out recovery and concurrency control. Consider a transaction T initiated at site Si, where the transaction coordinator is Ci. The Commit Protocol When T completes its execution—that is, when all the sites at which T has executed inform Ci that T has completed—Ci starts the 2PC protocol. • Phase 1. Ci adds the record to the log, and forces the log onto stable storage. It then sends a prepare T message to all sites at which T executed. On receiving such a message, the transaction manager at that site determines whether it is willing to commit its portion of T. If the answer is no, it adds a record to the log, and then responds by sending an abort T message to Ci. If the answer is yes, it adds a record to the log, and forces the log (with all the log records corresponding to T) onto stable storage. The transaction manager then replies with a ready T message to Ci. • Phase 2. When Ci receives responses to the prepare T message from all the sites, or when a prespecified interval of time has elapsed since the prepare T message was sent out, Ci can determine whether the transaction T can be committed or aborted. Transaction T can be committed if Ci received a ready T message from all the participating sites. Otherwise, transaction T must be aborted. Depending on the verdict, either a record or a record is added to the log and the log is forced onto stable storage. At this point, the fate of the transaction has been sealed. Following this point, the coordinator sends either a commit T or an abort T message to all participating sites. When a site receives that message, it records the message in the log. 2) Three-Phase Commit The three-phase commit (3PC) protocol is an extension of the two-phase commit protocol that avoids the blocking problem under certain assumptions. In particular, it is assumed that no network partition occurs, and not more than k sites fail, where k is some predetermined number. Under these assumptions, the protocol avoids blocking by introducing an extra third phase where multiple sites are involved in the decision to commit. Instead of directly noting the commit decision in its persistent storage, the coordinator first ensures that at least k other sites know that it intended to commit the transaction. If the coordinator fails, the remaining sites first select a new coordinator. This new coordinator checks the status of the protocol from the remaining sites; if the coordinator had decided to commit, at least one of the other k sites that it informed will be up and will ensure that the commit decision is respected. The new coordinator restarts the third phase of the protocol if some site knew that the old coordinator intended to commit the transaction. Otherwise the new coordinator aborts 2012-13

Unit II: Distributed Databases

2

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING EL-III Advanced Databases

Subject:

Class: BE Computer

University Questions: Unit II – Distributed Databases the transaction. While the 3PC protocol has the desirable property of not blocking unless k sites fail, it has the drawback that a partitioning of the network will appear to be the same as more than k sites failing, which would lead to blocking. The protocol also has to be carefully implemented to ensure that network partitioning (or more than k sites failing) does not result in inconsistencies, where a transaction is committed in one partition, and aborted in another. Because of its overhead, the 3PC protocol is not widely used. See the bibliographical notes for references giving more details of the 3PC protocol. 10

What is directory system? How LDAP can be used to provide multiple hierarchical views of data, without replicating the base-level data.

8

Ans. Consider an organization that wishes to make data about its employees available to a variety of people in the organization; example of the kinds of data would include name, designation, employee-id, address, email address, phone number, fax number, and so on. In the pre-computerization days, organizations would create physical directories of employees and distribute them across the organization. Even today, telephone companies create physical directories of customers. In general, a directory is a listing of information about some class of objects such as persons. Directories can be used to find information about a specific object, or in the reverse direction to find objects that meet a certain requirement. In the world of physical telephone directories, directories that satisfy lookups in the forward direction are called white pages, while directories that satisfy lookups in the reverse direction are called yellow pages. In today’s networked world, the need for directories is still present and, if anything, even more important. However, directories today need to be available over a computer network, rather than in a physical (paper) form. 11

Consider the relations:

8

Employee (name, address, salary, plant-no.) Machine (machine-number, type, plant-no.) Assume that the employee relation is fragmented horizontally by plant-number, and that each fragment is stored locally at its corresponding plant site. Assume that the machine relation is stored in its entirety at the Armonk site. Describe a good strategy for processing each of the following queries. i)

Find all employees at the plant that contains machine no. 1130.

ii)

Find all machines at the Almaden plant.

Find employee

2012-13

machine.

Unit II: Distributed Databases

3

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING EL-III Advanced Databases

Subject:

Class: BE Computer

University Questions: Unit II – Distributed Databases 12

Explain distributed transaction management. Ans.  

            

2012-13

4

Transaction management in a database system deals with the problems of maintaining consistency of data in spite of system failures and concurrent accesses to data. A transaction consists of a set of operations that perform a single logical unit of work in a database environment. It may be an entire program, or a part of a program, or a single command (SQL command), and it may involve any number of operations on the database. If a transaction is completed successfully, then the database moves from one consistent state to another. This consistency must be ensured irrespective of whether transactions are successfully executed simultaneously or there are failures during execution. Thus, a transaction is a unit of consistency and reliability. Reliability refers to both the resilience of a system to various types of failures and its capability to recover from them. A resilient system continues its normal execution even when failures occur. A recoverable DBMS always keeps the database in a consistent state either by moving back to a previous consistent state or by moving forward to a new consistent state following various types of failures. The basic difference between a query and a transaction is the fundamental properties of a transaction: atomicity and durability. A transaction ensures the consistency of the database irrespective of the facts that several transactions are executed concurrently and that failures may occur during their execution. A transaction can be considered to be made up of a sequence of read and write operations on the database, together with some computational steps. In that sense, a transaction may be thought of as a program with embedded database access queries. A transaction has four properties that lead to the consistency and reliability of a database management system. These are atomicity, consistency, isolation and durability(ACID). In a distributed system, transactions are classified into two different categories: local transactions and global transactions (or distributed transactions). If the data requirement of a transaction can be fulfilled from the local site, it is called a local transaction. Local transactions access data only from local sites. On the other hand, global transactions access data from remote sites or multiple sites. It is obvious that the transaction management in a distributed DBMS is more complicated than in a centralized DBMS, as the distributed DBMS must ensure the atomicity of the global transaction as well as of each component sub Unit II: Distributed Databases

4

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING EL-III Advanced Databases

Subject:

Class: BE Computer

University Questions: Unit II – Distributed Databases      

   

13

transaction executed at the local sites. This complicated task is performed by four high-level interconnected modules of the DBMS. These are transaction manager, concurrency control manager, recovery manager and buffer manager. The transaction manager coordinates transactions on behalf of application programs by communicating with the scheduler and implements a particular strategy for concurrency control. Depending on their lifetime or duration, transactions can be classified into two broad categories: short-duration transactions and long-duration transactions. A short-duration transaction (also called online transaction) requires a very short execution/response time and accesses a relatively small portion of the database. A long-duration transaction (also called a batch transaction) requires a longer execution/response time and generally accesses a larger portion of the database. Most of the statistical applications – report generation, complex queries, image processing – are characterized by long-duration transactions, whereas most of the current normal database applications including railway reservation, banking system, project management require the short-duration category transactions. Objectives of Distributed Transaction Management CPU and main memory utilization should be improved Response time should be minimized Availability should be maximized Communication cost should be minimized

Explain following concurrency control schemes along with the advantages & disadvantages in distributed databases. i)

Distributed lock manager

Majority protocol. Ans. i) Distributed lock manager-

2012-13



A compromise between the advantages and disadvantages can be achieved through the distributed lock-manager approach, in which the lock-manager function is distributed over several sites.



Each site maintains a local lock manager whose function is to administer the lock and unlock requests for those data items that are stored in that site.



When a transaction wishes to lock data item Q, which is not replicated and Unit II: Distributed Databases

5

8

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING EL-III Advanced Databases

Subject:

Class: BE Computer

University Questions: Unit II – Distributed Databases resides at site Si, a message is sent to the lock manager at site Si requesting a lock (in a particular lock mode). I 

f data item Q is locked in an incompatible mode, then the request is delayed until it can be granted. Once it has determined that the lock request can be granted, the lock manager sends a message back to the initiator indicating that it has granted the lock request.

Advantage:  Simple implementation.  Reduces the degree to which the coordinator is a bottleneck.  It has a reasonably low overhead.  requiring two message transfers for handling lock requests.  One message transfer for handling unlock requests. Disadvantage:  

Deadlock handling is more complex, since the lock and unlock requests are no longer made at a single site. There may be inter site deadlocks even when there is no deadlock within a single site.

ii) Majority protocol. The majority protocol works this way: If data item Q is replicated in n different sites, then a lock-request message must be sent to more than one-half of the n sites in which Q is stored. Each lock manager determines whether the lock can be granted immediately (as far as it is concerned). As before, the response is delayed until the request can be granted. The transaction does not operate on Q until it has successfully obtained a lock on a majority of the replicas of Q. Advantage: This scheme deals with replicated data in a decentralized manner, thus avoiding the drawbacks of central control. Disadvantages: • Implementation - The majority protocol is more complicated to implement than are the previous schemes. It requires 2(n/2 + 1) messages for handling lock requests, and (n/2 + 1) messages for handling unlock requests. • Deadlock handling - In addition to the problem of global deadlocks due to the use of a distributed lock-manager approach, it is possible for a deadlock to occur even if only one data item is being locked. As an illustration, consider a system with four sites and

2012-13

Unit II: Distributed Databases

6

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING Subject:

EL-III Advanced Databases

Class: BE Computer

University Questions: Unit II – Distributed Databases full replication. Suppose that transactions T1 and T2 wish to lock data item Q in exclusive mode. Transaction T1 may succeed in locking Q at sites S1 and S3, while transaction T2 may succeed in locking Q at sites S2 and S4. Each then must wait to acquire the third lock; hence, a deadlock has occurred. Luckily, we can avoid such deadlocks with relative ease, by requiring all sites to request locks on the replicas of a data item in the same predetermined order. 14

List the difference between directory and database. Also explain LDAP.

6

Ans. Directories

Databases

Read more frequently than written

Written more frequently than read

Handle small, simple units of data

Handle large, complex, transaction-oriented units of data

Distributed widely

Not distributed widely

Store information arranged entries

in

hierarchically Store information as records in relational tables

What is LDAP? LDAP is an Internet standard protocol used by applications to access information in a directory. It runs directly over TCP, and can be used to access a standalone LDAP directory service or to access a directory service that is back-ended by X.500. It was created as a way to minimize the implementation requirements on directory clients, and to simplify and encourage the use of directories among applications. The LDAP directory service model is based on entries. An entry is a collection of attributes that describing it. Each attribute has a name, type and one or more values. For example, attributes describing a person might include person's name (common name, or cn), telephone number, and email address. The entry for Peter Chan might have the following attributes: cn: Peter Chan mail: [email protected] telephoneNumber: 2358-1234 telephoneNumber: 2358-4321 roomNumber: 2228 LDAP is a protocol defining a directory service and access to that service. LDAP is

2012-13

Unit II: Distributed Databases

7

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING EL-III Advanced Databases

Subject:

Class: BE Computer

University Questions: Unit II – Distributed Databases based on a client-server model. LDAP servers provide the directory service, and LDAP clients use the directory service to access entries and attributes.

15

When is it useful to have replication or fragmentation? Explain your answer.

4

Ans. Replication is useful when there are many read-only transactions at different sites wanting access to the same data. They can all execute quickly in parallel, accessing local data. But updates become difficult with replication. Fragmentation is useful if transactions on different sites tend to access different parts of the database. 16

If we are to ensure atomicity, all the sites in which a T executed must agree on the final outcome of the execution T must either commit at all sites, or it must abort all sites. Describe the technique or protocol used to ensure this property in details. Ans: To ensure this property, the transaction coordinator of T must execute a commit protocol. Most widely used commit protocols is 1)The two-phase commit protocol (2PC) First describe how the two-phase commit protocol (2PC) operates during normal operation, then describe how it handles failures and finally how it carries out recovery and concurrency control. Consider a transaction T initiated at site Si , where the transaction coordinator is Ci.  The Commit Protocol When T completes its execution—that is, when all the sites at which T has executed inform Ci that T has completed—Ci starts the 2PC protocol. • Phase 1. Ci adds the record to the log, and forces the log onto stable storage. It then sends a prepare T message to all sites at which T executed. On receiving such a message, the transaction manager at that site determines whether it is willing to commit its portion of T. If the answer is no, it adds a record to the log, and then responds by sending an abort T message to Ci . If the answer is yes, it adds

2012-13

Unit II: Distributed Databases

8

7

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING Subject:

EL-III Advanced Databases

Class: BE Computer

University Questions: Unit II – Distributed Databases a record to the log, and forces the log (with all the log records corresponding to T) onto stable storage. The transaction manager then replies with a ready T message to Ci. • Phase 2. When Ci receives responses to the prepare T message from all the sites, or when a prespecified interval of time has elapsed since the prepare T message was sent out, Ci can determine whether the transaction T can be committed or aborted. Transaction T can be committed if Ci received a ready T message from all the participating sites. Otherwise, transaction T must be aborted. Depending on the verdict, either a record or a record is added to the log and the log is forced onto stable storage. At this point, the fate of the transaction has been sealed. Following this point, the coordinator sends either a commit T or an abort T message to all participating sites. When a site receives that message, it records the message in the log. A site at which T executed can unconditionally abort T at any time before it sends the message ready T to the coordinator. Once the message is sent, the transaction is said to be in the ready state at the site. The ready T message is, in effect, a promise by a site to follow the coordinator’s order to commit T or to abort T. To make such a promise, the needed information must first be stored in stable storage. Otherwise, if the site crashes after sending ready T, it may be unable to make good on its promise. Further, locks acquired by the transaction must continue to be held till the transaction completes. Since unanimity is required to commit a transaction, the fate of T is sealed as soon as at least one site responds abort T. Since the coordinator site Si is one of the sites at which T executed, the coordinator can decide unilaterally to abort T. The final verdict regarding T is determined at the time that the coordinator writes that verdict (commit or abort) to the log and forces that verdict to stable storage. In some implementations of the 2PC protocol, a site sends an acknowledge T message to the coordinator at the end of the second phase of the protocol. When the coordinator receives the acknowledge T message from all the sites, it adds the record to the log.

2) Three-Phase Commit The three-phase commit (3PC) protocol is an extension of the two-phase commit protocol that avoids the blocking problem under certain assumptions. In particular, it is assumed that no network partition occurs, and not more than k sites fail, where k is some predetermined number. Under these assumptions, the protocol avoids blocking by introducing an extra third phase where multiple sites are involved in the decision to commit. Instead of directly noting the commit decision in its persistent storage, the coordinator first ensures that at least k other sites know that it intended to commit the

2012-13

Unit II: Distributed Databases

9

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING Subject:

EL-III Advanced Databases

Class: BE Computer

University Questions: Unit II – Distributed Databases transaction. If the coordinator fails, the remaining sites first select a new coordinator. This new coordinator checks the status of the protocol from the remaining sites; if the coordinator had decided to commit, at least one of the other k sites that it informed will be up and will ensure that the commit decision is respected. The new coordinator restarts the third phase of the protocol if some site knew that the old coordinator intended to commit the transaction. Otherwise the new coordinator aborts the transaction. While the 3PC protocol has the desirable property of not blocking unless k sites fail, it has the drawback that a partitioning of the network will appear to be the same as more than k sites failing, which would lead to blocking. The protocol also has to be carefully implemented to ensure that network partitioning (or more than k sites failing) does not result in inconsistencies, where a transaction is committed in one partition, and aborted in another. Because of its overhead, the 3PC protocol is not widely used. See the bibliographical notes for references giving more details of the 3PC protocol. 17

Write a short note on persistent messaging in distributed Transaction Processing.

5

Ans. 1) For many applications, the blocking problem of two-phase commit is not acceptable. The problem here is the notion of a single transaction that works across multiple sites. we will use persistent messaging to avoid the problem of distributed commit. 2) To understand persistent messaging considers how one might transfer funds between two different banks, each with its own computer. 3)One approach is to have a transaction span the two sites and use two-phase commit to ensure atomicity. However, the transaction may have to update the total bank balance, and blocking could have a serious impact on all other transactions at each bank, since almost all transactions at the bank would update the total bank balance. In contrast, consider how fund transfer by a bank check occurs. The bank first deducts the amount of the check from the available balance and prints out a check. The check is then physically transferred to the other bank where it is deposited. After verifying the check, the bank increases the local balance by the amount of the check. The check constitutes a message sent between the two banks. So that funds are not lost or incorrectly increased, the check must not be lost, and must not be duplicated and deposited more than once. When the bank computers are connected by a network, persistent messages provide the same service as the check (but much faster, of course). 4) Persistent messages are messages that are guaranteed to be delivered to the recipient exactly once (neither less nor more), regardless of failures, if the transaction sending the message commits, and are guaranteed to not be delivered if the transaction aborts. Database recovery techniques are used to implement persistent messaging on top of the normal network channels, as we will see shortly. In contrast, regular messages may be lost or may even be delivered multiple times in some situations. 2012-13

Unit II: Distributed Databases

10

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING Subject:

EL-III Advanced Databases

Class: BE Computer

University Questions: Unit II – Distributed Databases

18

5)Error handling is more complicated with persistent messaging than with twophase commit. For instance, if the account where the check is to be deposited has been closed, the check must be sent back to the originating account and credited back there. Both sites must therefore be provided with error handling code, along with code to handle the persistent messages. In contrast, with two-phase commit, the error would be detected by the transaction, which would then never deduct the amount in the first place. Explain Heterogeneous distributed database. Ans. Many new database applications require data from a variety of preexisting databases located in a heterogeneous collection of hardware and software environments. Manipulation of information located in a heterogeneous distributed database requires an additional software layer on top of existing database systems. This software layer is called a multi-database system. The local database systems may employ different logical models and data-definition and data-manipulation languages, and may differ in their concurrency-control and transaction-management mechanisms. A multi-database system creates the illusion of logical database integration without requiring physical database integration.

5

Full integration of heterogeneous systems into a homogeneous distributed database is often difficult or impossible: • Technical difficulties. The investment in application programs based on existing database systems may be huge, and the cost of converting these applications may be prohibitive. • Organizational difficulties. Even if integration is technically possible, it may not be politically possible, because the existing database systems belong to different corporations or organizations. In such cases, it is important for a multi-database system to allow the local database systems to retain a high degree of autonomy over the local database and transactions running against that data. For these reasons, multi-database systems offer significant advantages that outweigh their overhead. We will provide an overview of the challenges faced in constructing a multi-database environment from the standpoint of data definition and query processing. 19

Define Semi-join. Compare semi-join r α s for the relation r and s Relation r A B 1 2 4 5 1 2 5 3 8 9

2012-13

c 3 6 4 2 7

Unit II: Distributed Databases

Relation S C D 3 4 3 6 2 3 1 4 1 2

7

E 5 8 2 1 3 11

PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR 26, PRADHIKARAN, NIGDI PUNE-44

DEPARTMENT OF COMPUTER ENGINEERING Subject:

EL-III Advanced Databases

Class: BE Computer

University Questions: Unit II – Distributed Databases Ans: Suppose that we wish to evaluate the expression r1 r2, where r1 and r2 are stored at sites S1 and S2, respectively. Let the schemas of r1 and r2 be R1 and R2. Suppose that we wish to obtain the result at S1. If there are many tuples of r2 that do not join with any tuple of r1, then shipping r2 to S1 entails shipping tuples that fail to contribute to the result. We want to remove such tuples before shipping data to S1, particularly if network costs are high. A possible strategy to accomplish all this is: 1. Compute temp1 ← ΠR1 ∩ R2 (r1) at S1. 2. Ship temp1 from S1 to S2. 3. Compute temp2 ← r2 temp1 at S2. 4. Ship temp2 from S2 to S1. 5. Compute r1 temp2 at S1. The resulting relation is the same as r1 r2. Before considering the efficiency of this strategy, let us verify that the strategy computes the correct answer. In step 3, temp2 has the result of r2 ΠR1 ∩ R2 (r1). In step 5, compute r1 r2 ΠR1 ∩ R2 (r1) Since join is associative and commutative, we can rewrite this expression as (r1 ΠR1 ∩ R2 (r1)) r2 Since r1 Π(R1 ∩ R2) (r1) = r1, the expression is, indeed, equal to r1 r2, the expression we are trying to evaluate. 20

Describe the voting and read-any-write all approach to synchronous replication.

5

21

Explain optimistic method for Distributed Concurrency control

5

2012-13

Unit II: Distributed Databases

12

University Questions: Unit II – Distributed Databases - https://groups.google.com/group/teb_comp_engineers/attach/.../ADB_Unit_2.pdf?...

to the log, and forces the log (with all the log records corresponding to T) onto stable storage. The transaction manager then replies with a ready T ...

484KB Sizes 1 Downloads 38 Views

Recommend Documents

Distributed Databases for Challenged Networks
devices. As explained in [1], these types of networks are becoming important with the pervasiveness of wireless technology. ... [9] is a mobile surveillance system, where buses ... application developer needs to schedule packets to different.

Distributed Databases for Challenged Networks
heuristics for query scheduling 2) a prereplication scheme that reduces the cost of on-demand retrieval by actively pre- caching data. To our knowledge, this is the first work to examine these ... for query processing in a distributed Database for DT

UNIT II -
Mercantile Transactions Using Credit. Cards. • Two major components compromise credit card transactions in this process: electronic authorization and ...

Unit 1 - Distributed Programming.pdf
... system. ◦ Distributed programming is a process of writing. distributed programs. Distributed Programming 4. Page 4 of 50. Unit 1 - Distributed Programming.pdf.

Top-Down Approach in Distributed Databases
COMPUTER ENGINEERING COURSE. TOP-DOWN APPROACH IN. DISTRIBUTED DATABASES. By: Leniel Braz de Oliveira Macaferi. Paper presented to the ...

iOverbook - Distributed Object Computing - Vanderbilt University
A 16:1 CPU overbooking ratio means that one physical CPU. (pCPU) core can be ..... demand when flash crowds occur by refining itself through learning new ...

UNIT II MAD Notes.pdf
UNIT II MAD Notes.pdf. UNIT II MAD Notes.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying UNIT II MAD Notes.pdf.

Planner NurseryT0 II Unit III.pdf
Planner NurseryT0 II Unit III.pdf. Planner NurseryT0 II Unit III.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Planner NurseryT0 II Unit III.pdf.

Unit II - The Political Process.pdf
Explain how James Madison in Federalist #10 defined factions. Why did Madison fear factions,. and how was the Constitution designed to cure the “mischief of ...

FPL-II Specimen Questions -
In the Hard Disk, 3. in the Keyboard, 4. None of these. 4. 4. 80386DX Microprocessor ... The data bus size of 80386DX is. 1. 16-bit, 2. 32-bit, 3. 64-bit 4. None of ...

DBMS University questions and solutions.pdf
Ex. MySQL, Microsoft SQL Server, Oracle, Sybase, Microsoft Access. Models real world ... Deals with the management of space on disk where data is stored. – Higher layers ... up-to-date. Limitations of File Processing System ... Integrity constraint

Mahatma Gandhi University M.Tech IT Sem 2 Distributed Algorithms ...
b) How to an elect a leader in a network? Explain. (15 marks). OR. 2. a) Give working principle of ... 3. a) Discuss Leader election in a Synchronous ring. (10 marks). b) Explain about Distributed ... Page 2 of 2. Main menu. Displaying Mahatma Gandhi

Mahatma Gandhi University M.Tech IT Sem 2 Distributed Algorithms ...
Give an example of a failure pattern and a failure detector ... token. Give a scenario in which first node 5, then node 4, and then node 2 requests the ... In the t-Byzantine robust synchronizer of Lamport and Melliar – Smith, a correct ... Display

Unit 4 Video Questions The Music Instinct.pdf
Unit 4 Video Questions The Music Instinct.pdf. Unit 4 Video Questions The Music Instinct.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Unit 4 ...

Solutions to KU Revision Questions for Electricity & Energy Unit ...
Solutions to. KU Revision Questions for Electricity & Energy. Unit Assessment. Page 2. Page 3. Page 4. Page 5. Page 6. Page 7. Page 8. Page 9. Page 10. Page ...

Solutions to KU Revision Questions for Dynamics & Space Unit ...
On your diagram mark where the aerial should be positioned to get the strongest signal. (iii) On the blank oscilloscope grid below, draw the signal ... Page 14 ...

Solutions to KU Revision Questions for Electricity & Energy Unit ...
mrmackenzie.co.uk. National 4. Physics. Solutions to. KU Revision Questions for Electricity & Energy. Unit Assessment. Page 2. Page 3. Page 4. Page 5. Page 6 ...

10-science-unit-test-questions-EM_doozy study.pdf
The following are the events in the formation of the first cloned animal – the sheep Dolly. a) Removal of haploid nucleus from the ovum. b) Implantation of ovum with diploid nucleus into the surrogate mother. c) Collection of udder cell from the sh

Solutions to KU Revision Questions for Dynamics & Space Unit ...
(continued). (d) In an experiment to investigate mobile phone signals, a student sets up ... The mobile phone transmits signals as pulses. (i) Why is ... any smaller.

Unit I: Introduction to Interfacing Unit II: Legacy DOS ... -
Define Machine cycle with respect to microprocessor? 6. What do we ... Explain batch file? 5. What is ... What is PSP? Draw and explain the structure of PSP? 3.

Unit I: Introduction to Interfacing Unit II: Legacy DOS ... -
List feature of 8086 microprocessor? 2. List default offset pare of segment registers in 8086? 3. Why address and data bus are multiplexed in microprocessors?

Unit II CV Raman & Sam Pitroda.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

IC Unit 05 Part -II Oscillators all.pdf
IC Unit 05 Part -II Oscillators all.pdf. IC Unit 05 Part -II Oscillators all.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying IC Unit 05 Part -II Oscillators ...

UNIT II MPI NEW 22022018.pdf
The stack segment is maintained by two registers: - The stack pointer (SP) and the stack segment register (SS). Always a word is entered into stack. - Whenever ...