Wednesday, May 13, 2020
Annotated Bibliography On Database Algorithms - 2083 Words
Replication: An approach to enhance consistency in large Database clusters. Ayyapa Reddy Pasam, ayyappayouth@gmail.com Abstract Database systems implemented in parallel computers is called Database clustering. Clustering Databases provides us with an advantage of Cost effectiveness. ââ¬Å"A grouping of related items stored together for efficiency of access and resource utilization.â⬠In Relational Database the notion of clustering is straight forward. The physical clustering of data in this environment is extremely important to database performance since the architecture of RDBMS systems is heavily server-centric. In this we describe the Advantages done for clustering through replication. The ways in which Replicationâ⬠¦show more contentâ⬠¦The process of creating and managing duplicate versions of a database. Replication not only copies a database but also synchronizes a set of replicas that changes made to one replica are reflected in all the others. One good feature of the replication is User can access the Local copy of old version of database even if it is updated. Replication is often good method of data access in database. By the concept of replication in clusters, even if single cluster is destroyed it does not affect all the clusters. Each cluster is independent of other clusters. They function using their own hardware interfaces. A replication service is required to Maintain data consistency across these diverse environments. Distribution reduces the network costs for query access, and it improves application availability and consistency. In this we first discuss about cluster architecture, replication, types in the next section, Implementation of replication, Tools available in next section, problems with replication, how to overcome those problems and ensure consistency. 2. Multi master cluster architecture Coming to this architecture, it consists of group of N nodes which indeed are clusters each having connection to a fast network. Let us know about node interior. Request router takes care of user requests. User authentication is done at the request router. It takes care of routing the user requests to specific application
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.