StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What Is a Distributed Database - Assignment Example

Cite this document
Summary
This assignment "What Is a Distributed Database" sheds some light on the word client-server that refers to an accepted model for networking of computer systems that makes use of server and client devices which are designed for their respective purposes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
What Is a Distributed Database
Read Text Preview

Extract of sample "What Is a Distributed Database"

ENTERPRISE SYSTEM goes here] [Your goes here] [Due the paper] Answer No a) Client-Server Model The word client-server refers to an accepted model for networking of computer systems that makes use of server and client devices which are designed for their respective purposes. The client-server model is used both in local area networks and on the internet. Some of the main examples of the client-server model include FTP servers and clients, Web servers and Web browsers, and the DNS (Mitchell n.d.). Modern companies make use of LANS, as well as internet for carrying out their business processes. Therefore, client-server systems can definitely help them in making effective use of client-server technology. However, increased dependence on the centralized server is a disadvantage of such models because if the server goes down, the entire network of computers becomes unable to work. b) Thin-Client Model The thin client technology also provides server-based computing facility to companies (Kumar 2007). There is a browser terminal or a central server from which all other computers can access required information, as well as can do required work through sharing. Companies can use either standalone or wireless thin clients to run their business processes. The purpose of the technology is to facilitate businesses through reducing the total cost of ownership and providing easy and efficient usage. The main advantages of using think clients are security, efficient use of resources, and low cost (Kumar 2007). The main disadvantage of this technology is that not is not designed for heavy tasks. Answer No. 2 a) Risks to Data Integrity of Distributed Databases “A distributed database is a database that is split over multiple hardware devices but managed by a central database controller” (Holmes n.d.). A distributed database means division of a database into different physical units separated by business or geographical regions. Some of the main advantages of using distributed databases in business include better control of resources and improved business performances. However, the risks associated with data integrity of distributed databases include accuracy of stored data and the risk of unauthorized access to spoil or alter the stored data. b) Strategies to Overcome Risks The first strategy that can be used to overcome such risks include double checking the database for database integrity, domain integrity, and referential integrity before and after making changes to the data. The second strategy is using authentication of the people trying to log on to the network. Using this feature, only officials are provided with passwords and biometrics that they can use to prove their identity, as well as to make secure use of the distributed network. Authentication is done to make the network safe by stopping and preventing unauthorized attempts to the network. Answer No. 3 Groupware is a term that refers to specialized software applications that help members of a group in sharing and synchronizing business information, as well as in communicating with each other in an effective manner. “Groupware can allow both geographically dispersed team members and a companys on-site workers to collaborate with each other through the use of computer networking technologies” (Pinola, n.d.). Some of the main groupware technologies that are widely used in companies include shared Microsoft Office applications, email systems, video conferencing, electronic whiteboard, and instant messaging through messengers. All of these techniologies help employees in communicating with eah other regardig every business matter. These technologies also increase business efficency, as well as employee productivity. Therefore, the statement that helps in icnreasing on-going coordination between people is true. Answer No. 4 ICT, Information and Communication Technology, refers to every such technology that deals with electronic transfer of information from one point to another (Singleton 2010). The information exchange can take place using any communication medium, such as, emails and personal computers. Both of these technologies fall under the same category because both of these deal with electronic exchange of information but in different ways. “ICT incorporates products that store, receive, manipulate, transmit or retrieve digital information under a single umbrella” (Singleton 2010, p. 1). Five main information and computer technologies include internet, mobile phone, email, television, and skype. All of these technologies help in electronic exchange of information. Internet helps in connecting to each other through networks. Mobile phones help in transferring information to the other person regardless of the difference between places. Moreover, both persons can talk, as well as send messages to each other using cell phones. Email is another ICT technology which helps users in sending business, personal, and professional information to each other regardless of their locations. However, email is less efficient mode of communication as compared to cell phones. Television is another ICT technology which helps in sending one-way information to the audience. Fifth ICT technology is skype chat which helps users communicate and see each other at the same time. Answer No. 5 A distributed computing system is a system in which different software applications are installed in different computer systems or in a central computer system and all computers can access those software applications. A number of security threats usually surround disributed computing networks which need to be dealt effectively in order to make the system safe and secure for its users. Some of the main security threats include denial of service, accidental access, passive tap, active tap, and faking (Wilbur 2000). The security measures that can be taken to overcome these risks or security issues include authentication, WIFI protected access, authorization, and encryption. Authentication, as described earlier, is a way to provide access to networks only to authorized users. WIFI-Protected access is considered one of the most protected ways to access network because of the level of safety that it provides to the users. Authorization basically refers to the idea of access control. It works in the same way as authentication as it confirms the identity of people who try to access the network. It uses file permission technique to allow or prevent access to the network. Encryption is also a good technique which converts the data being sent to the network in an unreadable form. Encryption allows only authorized users to decrypt the data. To manage a distributed computing system, there needs to be a network administrator who should look after all security threats and related measures. Answer No. 6 Web-based or cloud computing is a common term that is used to portray the delivery of hosted service using web service. “It is a technology that uses the internet and central remote servers in order to keep up facts and figures, and applications” (Ghosh 2012, p. 1). It helps industries in reducing the workload and improving efficiency. Unlike traditional business applications, web-based computing washes out the issues of software and hardware failures. In traditional settings, firms usually need to install, customize, and run software applications, whereas with web-based computing, companies get their work done through software applications present on the web. Moreover, they do not need to worry about any technical failure or information misuse. Using web-based computing system, companies experience a substantial amount of workload shift because many of the tasks are performed on web. If we talk about the drawbacks of web-based computing, we can say that loss of control due to increased dependency on web and privacy concerns are the biggest concerns. Answer No. 7 Groupware means using shared reasources to complete business taskss. Some of the main groupware technologies being used widely include email systems, electronic whiteboard, shared Microsoft Office services, video conferencing, and instant messaging through messenger services. All of these services and products help employees complete their work in a collablorative manner. The system administrator provides the information to each employees simultaneously which increases their effecincy level. File sharing is a key feature of groupware which helps exmployees upload files for each other. Yahoo groups is also a key groupware feature which helps users ineract with each other easily using a shared platform. Video conferencing is a technology which helps employees discuss group tasks with each other while viewing each other. Answer No. 8 Denial of service attacks are considered the most destructive attacks on computer networks. To minimize the chance of future accidental or malicious loss-of-service, I would use to stop denial of service attacks include using packet filtering on routers, using SYN cookies, configuring windows firewall, and configuring the web server. Being the Chief Information Officer, I will do packet filtering as the first step because it ensures removal of malicious content from the packets being delivered to the computer systems through networks. Moreover, I will use firewall to protect the computer systems from unauthorized accesses. As Ryan (2011) states, “firewall will prevent unauthorized access to your computer from any external source, and the settings can be varied from low security to high” (p. 1). Firewalls turn off the access requests of unauthorized elements using the log file that consists of all details related to the connections that may or may not be trying to intrude into the computer systems. Apart from ensuring network safety from DoS attacks, I will also take steps to ensure continuity of business functioning. For this, I will create a backup of everything related to storage of data and information in the computer systems. The backup will help me retrieve the information that would have been lost due to IT failure. References Ghosh, M 2012, ‘Cloud Computing Technology’, viewed 16 December 2012, http://ezinearticles.com/?Cloud-Computing-Technology&id=7246958 Holmes, T n.d., ‘What Is a Distributed Database?’, viewed 16 December 2012, http://www.wisegeek.com/what-is-a-distributed-database.htm Kumar, P 2007, ‘Thin Clients’, viewed 16 December 2012, http://ezinearticles.com/?Thin-Clients&id=762583 Mitchell, B n.d., ‘Introduction to Client Server Networks’, viewed 16 December 2012, http://compnetworking.about.com/od/basicnetworkingfaqs/a/client-server.htm Pinola, M n.d., ‘What Is Groupware?’, viewed 16 December 2012, http://mobileoffice.about.com/od/glossary/g/what-is-groupware.htm Ryan, J 2011, ‘Best Internet Security’, viewed 16 December 2012, http://ezinearticles.com/?Best-Internet-Security&id=5899605 Singleton, A 2010, ‘So, What is ICT?’, viewed 16 December 2012, http://ezinearticles.com/?So,-What-is-ICT?&id=4463170 Wilbur, S 2000, ‘Distributed Systems Security’, viewed 16 December 2012, http://www0.cs.ucl.ac.uk/staff/s.wilbur/3c31/z08notes.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(What Is a Distributed Database Assignment Example | Topics and Well Written Essays - 1500 words - 1, n.d.)
What Is a Distributed Database Assignment Example | Topics and Well Written Essays - 1500 words - 1. https://studentshare.org/information-technology/1791161-enterprice-system
(What Is a Distributed Database Assignment Example | Topics and Well Written Essays - 1500 Words - 1)
What Is a Distributed Database Assignment Example | Topics and Well Written Essays - 1500 Words - 1. https://studentshare.org/information-technology/1791161-enterprice-system.
“What Is a Distributed Database Assignment Example | Topics and Well Written Essays - 1500 Words - 1”. https://studentshare.org/information-technology/1791161-enterprice-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF What Is a Distributed Database

Efficiency and Collaboration Proposal

Technology refers to ways of data transformation and interpretation by the business through use of hardware, software, database and telecommunication.... Technology refers to ways of data transformation and interpretation by the business through use of hardware, software, database and telecommunication.... Importance of Converting Data in Microsoft “Excel” Spreadsheets into a Relational database Using Microsoft “Access” Spreadsheets in Microsoft Excel are used to collect information and user friendly....
3 Pages (750 words) Essay

Main Functions of Middleware

- Advance applications - New enterprise applications harness Middleware technology for Single System Login, Enhanced Security, Location Transparency, database and Application Oriented Services however they are not very common.... - distributed Object Middleware (DOM) - DOM suc.... distributed Object Middleware (DOM) - DOM such as DCOM and CORBA gives all the advantage of OOPS such as encapsulation and inheritance....
3 Pages (750 words) Essay

Information Management and Statistics, Component A - Case Study Assessment

The use of a database is an effective way of storing data about a certain aspect at once.... Databases in the bank allows for instant changes in the data thus affecting the whole database and not just changing file by file.... The database is administered by an expert who engineered it; he has become part of the data management team....
12 Pages (3000 words) Essay

Mirroring as a Fault Tolerant System

nbsp; Understanding the different components as a part of shadowing and mirroring as well as how it can be used to assist in databases can provide individuals with more alternatives for building the database security needed while creating higher levels of fault tolerance.... This essay "Mirroring as a Fault-Tolerant System" expresses the need to examine the benefits and disadvantages of the mirroring system is also required....
7 Pages (1750 words) Essay

Database Systems Management

They will understand what the clients want and what is frequented by these clients.... This paper "database Systems Management" focuses on the fact that there are various transactions that will be experienced within the database.... One of them that will be common in the database is that of inserting.... hellip; The various staff will be inserting new items to the database.... The Acibadem database will be used to insert new patients in the hospital database....
1 Pages (250 words) Essay

Storage of User Generated Data Using Distributed Backup Method

This paper looks into how companies use big data technology to store data generated by users in exabytes by making use of the distributed backup method.... The distributed backup method of storage provides companies with the opportunity to store more data in a scalable way across storage node networks.... It is imperative to note that the main purpose of backing up data is so that an organization can have at least a copy of what may the company may consider as important....
5 Pages (1250 words) Essay

IT Issues Analysis

ata Definition Language (DDL) refers to statements that define the schema or database structure.... For instance, CREATE – creates objects, ALTER – alters the database structure, DROP – deletes objects, COMMENT – adds comments to the dictionary of date, and RENAME – Renames database objects.... It mostly deals with permissions, rights, and additional controls of the database.... Requirements for DFS to work optimally include Domain Name System as well as Active Directory with proper replication, properly configured Active Directory sites, properly working domain controller emulator, domain controllers as well as root servers with active distributed File System (DFS), computers running on Windows XP, Windows Server 2003, Windows 2000 Service Pack 4, or Windows NT 4....
2 Pages (500 words) Assignment

Implementing Database Security

Second, the 2014 MS SQL server has the new SQL Server Data Tools for Business Intelligence for making Analysis Services prototypes, Reporting… Third, the 2014 MS SQL server has memory-enhanced tables that serve as memory-enhanced database engines incorporated into the SQL Server tool (Natan, p.... Third, the 2014 MS SQL server has memory-enhanced tables that serve as memory-enhanced database engines incorporated into the SQL Server tool (Natan, p.... Fourth, the 2014 MS SQL server also has an SQL Server Data Files in Windows Azure facilitates the integral compatibility for SQL Server database files stored as Windows Azure Blobs....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us