SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/1
Outline
• Introduction
• Background
• Distributed Database Design
• Database Integration
• Semantic Data Control
• Distributed Query Processing
• Multimedia Query Processing
• Distributed Transaction Management
• Data Replication
• Parallel Database Systems
• Distributed Object DBMS
➡ Object Models
➡ Object Distribution
• Peer-to-Peer Data Management
• Web Data Management
• Current Issues
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/2
Why Object DBMS
Some applications require
• storage and management of abstract data types (e.g., images, design
documents)  rich type system supporting user-defined abstract types;
• need to explicitly represent composite and complex objects without
mapping to flat relational model;
• need more powerful languages without the impedance mismatch.
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/3
Fundamental Concepts
• Object
➡ An entity in the system that is being modeled.
➡ <OID, state, interface>
• OID: object identifier
➡ Immutable
• State
➡ Atomic or constructed value
➡ Atomic values are instance variables (or attributes)
➡ Constructed values can be set or tuple
• Interface
➡ State and behaviour
➡ Behavior captured by methods
• Object states may change, but OID remains identical
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/4
Fundamental Concepts (cont’d)
• Type
➡ Domain of objects
• Class
➡ Template for a group of objects defining a common type that conforms to the
template
• Example
type Car
attributes
engine: Engine
bumbers: {Bumper}
tires: [lf: Tire, rf: Tire, lr: Tire, rr: Tire]
make: Manufacturer
model: String
year: Date
serial_no: String
capacity: Integer
methods
age: Real
replaceTire(place, tire)
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/5
Fundamental Concepts (cont’d)
• Composition (aggregation)
➡ Composite type (Car) and composite object
➡ Allows referential sharing – objects refer to each other by their OIDs as values
of object-based variables
➡ Composition relationships can be represented by composition (aggregation)
graph
• Subclassing and inheritance
➡ Subclassing is based on specialization: class A is a specialization of class B if
A’s interface is a superset of B’s interface.
➡ Inheritance: result of subclassing – class A’s properties consist of what is
defined for it as well as the properties of class B that it inherits
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/6
Object Distribution
• New problems due to encapsulation of methods together with object state.
• Fragmentation can be based on
➡ State
➡ Method definitions
➡ Method implementation
• Class extent can be fragmented
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/7
Fragmentation Alternatives
• Horizontal
➡ Primary
➡ Derived
➡ Associated
• Vertical
• Hybrid
• Path partitioning
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/8
Horizontal Fragmentation
• Primary
➡ Defined similar to the relational case
• Derived
➡ Due to the fragmentation of a subclass
➡ Due to fragmentation of a complex attribute
➡ Due to method invocation
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/9
Vertical Fragmentation
• For a class C, fragmenting it vertically into C1, …, Cm produces a number of
classes, each of which contains some of the attributes and some of the
methods.
➡ Each fragment is less defined than the original class
• Issues
➡ Subtyping relationship between C’s superclasses and subclasses and the
fragment classes
➡ Relationship of the fragment classes among themselves
➡ Location of the methods when they are not simple methods
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/10
Path Partitioning
• Clustering all of the objects forming a composite object into a partition
• Can be represented as a hierarchy of nodes forming a structural index
➡ Each node of the index points to objects of the domain class of the component
object
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/11
Object Server Architecture
• Clients request “objects” from the
server
➡ Single object or groups of objects can
be returned
• Server undertakes most of the
DBMS services
• Object manager duplicated
➡ Provides a context for method
execution
➡ Implementation of object identifier
➡ Object clustering and access methods
(at server)
➡ Implement an object cache
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/12
Page Server Architecture
• Unit of transfer between clients
and server is a physical unit of data
➡ E.g., page or segment
• DBMS services split between the
client and the server
• Servers typically do not have the
notion of “object”
• Clients have to do the conversion
from an “object” to a physical unit
and vice versa
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/13
Cache Consistency
• Avoidance-based
➡ Prevents access to stale cache data by ensuring that clients cannot update an
object if it is being read by other clients
✦ Object in cache is stale if it has already been updated and committed to the
database by a different client
➡ Stale data cannot exist in the cache
• Detection-based
➡ Detect stale object access at a validation step at commit time
➡ Stale data is allowed to exist in the cache
• Each can further classified based on when the client informs the server
about writes
➡ Synchronous
➡ Asynchronous
➡ Deferred
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/14
Alternative Cache Consistency
Algorithms
• Avoidance-based synchronous
• Avoidance-based asynchronous
• Avoidance-based deferred
• Detection-based synchronous
• Detection-based asynchronous
• Detection-based deferred
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/15
Object Identifier Management
• Physical object identifier (POID)
➡ OID is equated with the physical address of the corresponding object
➡ Address can be disk page address and an offset from the base address
+ Object can be obtained directly from the OID
- Parent object and all indexes need to be updated when object moves
• Logical identifier (LOID)
➡ System-wide unique
➡ A mapping has to occur to map it to the physical address
+ Object can be easily moved
- Indirection overhead
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/16
Object Migration
• Unit of migration
➡ Object state but not methods
✦ Requires invocation of remote procedures
➡ Individual objects
✦ Types may be accessed remotely or duplicated
• Tracking objects
➡ Surrogates or proxy objects
➡ Placeholders: accesses to proxy objects are directed transparently by the
system to the objects themselves at the new sites
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/17
Distributed Object Storage
• Object clustering
➡ Decomposition storage model
✦ Partition eachobject class into binary relations (OID, attribute)
✦ Relies on LOID
➡ Normalized storage model
✦ Stores each class as a separate relation
✦ Can use LOID or POID
➡ Direct storage model
✦ Multi-class clustering og objects based on the composition relationship
• Distributed garbage collection
➡ Reference counting
➡ Tracing-based
✦ Mark and sweep
✦ Copy-based
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/18
Object Query Processing
• Similar approach to relational can be followed.
• Additional difficulties
➡ Complexity of the type system
➡ Encapsulation makes knowledge of physical organization and access methods
difficult
➡ Object structures are complex requiring path expressions for access
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/19
Transaction Management
• Difficulties resulting from the following requiremens
➡ Operations are not simple Read and Write
➡ Objects are not “flat” but complex and composite
➡ Access patterns are not simple
➡ Long running activities need to be supported
➡ Active object capabilities are sometimes required
Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/20
Correctness Criteria
• Commutativity
• Invalidation
• Recoverability

Weitere ähnliche Inhalte

Was ist angesagt?

Database , 8 Query Optimization
Database , 8 Query OptimizationDatabase , 8 Query Optimization
Database , 8 Query OptimizationAli Usman
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computinghuda2018
 
Unit 3(advanced state modeling & interaction meodelling)
Unit  3(advanced state modeling & interaction meodelling)Unit  3(advanced state modeling & interaction meodelling)
Unit 3(advanced state modeling & interaction meodelling)Manoj Reddy
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management systemPooja Dixit
 
Codd's Rules for Relational Database Management Systems
Codd's Rules for Relational Database Management SystemsCodd's Rules for Relational Database Management Systems
Codd's Rules for Relational Database Management SystemsRajeev Srivastava
 
Unit 2(advanced class modeling & state diagram)
Unit  2(advanced class modeling & state diagram)Unit  2(advanced class modeling & state diagram)
Unit 2(advanced class modeling & state diagram)Manoj Reddy
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentationhamza haseeb
 
Validation based protocol
Validation based protocolValidation based protocol
Validation based protocolBBDITM LUCKNOW
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Meghaj Mallick
 
Query Decomposition and data localization
Query Decomposition and data localization Query Decomposition and data localization
Query Decomposition and data localization Hafiz faiz
 
Distributed database management system
Distributed database management systemDistributed database management system
Distributed database management systemVinay D. Patel
 
Concurrency control
Concurrency controlConcurrency control
Concurrency controlvarsha singh
 

Was ist angesagt? (20)

Database , 8 Query Optimization
Database , 8 Query OptimizationDatabase , 8 Query Optimization
Database , 8 Query Optimization
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computing
 
Concurrency control
Concurrency control Concurrency control
Concurrency control
 
Unit 3(advanced state modeling & interaction meodelling)
Unit  3(advanced state modeling & interaction meodelling)Unit  3(advanced state modeling & interaction meodelling)
Unit 3(advanced state modeling & interaction meodelling)
 
Transaction Processing in DBMS.pptx
Transaction Processing in DBMS.pptxTransaction Processing in DBMS.pptx
Transaction Processing in DBMS.pptx
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
Concurrency Control.
Concurrency Control.Concurrency Control.
Concurrency Control.
 
Codd's Rules for Relational Database Management Systems
Codd's Rules for Relational Database Management SystemsCodd's Rules for Relational Database Management Systems
Codd's Rules for Relational Database Management Systems
 
Unit 2(advanced class modeling & state diagram)
Unit  2(advanced class modeling & state diagram)Unit  2(advanced class modeling & state diagram)
Unit 2(advanced class modeling & state diagram)
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentation
 
2 phase locking protocol DBMS
2 phase locking protocol DBMS2 phase locking protocol DBMS
2 phase locking protocol DBMS
 
Validation based protocol
Validation based protocolValidation based protocol
Validation based protocol
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
 
Query Decomposition and data localization
Query Decomposition and data localization Query Decomposition and data localization
Query Decomposition and data localization
 
Distributed database management system
Distributed database management systemDistributed database management system
Distributed database management system
 
Timestamp protocols
Timestamp protocolsTimestamp protocols
Timestamp protocols
 
B and B+ tree
B and B+ treeB and B+ tree
B and B+ tree
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
DBMS - RAID
DBMS - RAIDDBMS - RAID
DBMS - RAID
 
Triggers and active database
Triggers and active databaseTriggers and active database
Triggers and active database
 

Andere mochten auch

Database, 3 Distribution Design
Database, 3 Distribution DesignDatabase, 3 Distribution Design
Database, 3 Distribution DesignAli Usman
 
Database , 1 Introduction
 Database , 1 Introduction Database , 1 Introduction
Database , 1 IntroductionAli Usman
 
Database ,2 Background
 Database ,2 Background Database ,2 Background
Database ,2 BackgroundAli Usman
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data IntegrationAli Usman
 
Fragmentation as a Part of Security in Distributed Database: A Survey
Fragmentation as a Part of Security in Distributed Database: A SurveyFragmentation as a Part of Security in Distributed Database: A Survey
Fragmentation as a Part of Security in Distributed Database: A SurveyEditor IJMTER
 
Database , 5 Semantic
Database , 5 SemanticDatabase , 5 Semantic
Database , 5 SemanticAli Usman
 
PL/pgSQL - An Introduction on Using Imperative Programming in PostgreSQL
PL/pgSQL - An Introduction on Using Imperative Programming in PostgreSQLPL/pgSQL - An Introduction on Using Imperative Programming in PostgreSQL
PL/pgSQL - An Introduction on Using Imperative Programming in PostgreSQLReactive.IO
 
MySQL InnoDB 源码实现分析(一)
MySQL InnoDB 源码实现分析(一)MySQL InnoDB 源码实现分析(一)
MySQL InnoDB 源码实现分析(一)frogd
 
Database ,16 P2P
Database ,16 P2P Database ,16 P2P
Database ,16 P2P Ali Usman
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 ReliabilityAli Usman
 
Database ,10 Transactions
Database ,10 TransactionsDatabase ,10 Transactions
Database ,10 TransactionsAli Usman
 
Postgres MVCC - A Developer Centric View of Multi Version Concurrency Control
Postgres MVCC - A Developer Centric View of Multi Version Concurrency ControlPostgres MVCC - A Developer Centric View of Multi Version Concurrency Control
Postgres MVCC - A Developer Centric View of Multi Version Concurrency ControlReactive.IO
 
Database ,14 Parallel DBMS
Database ,14 Parallel DBMSDatabase ,14 Parallel DBMS
Database ,14 Parallel DBMSAli Usman
 
InnoDB Internal
InnoDB InternalInnoDB Internal
InnoDB Internalmysqlops
 
Database , 13 Replication
Database , 13 ReplicationDatabase , 13 Replication
Database , 13 ReplicationAli Usman
 
Database ,7 query localization
Database ,7 query localizationDatabase ,7 query localization
Database ,7 query localizationAli Usman
 
Database ,11 Concurrency Control
Database ,11 Concurrency ControlDatabase ,11 Concurrency Control
Database ,11 Concurrency ControlAli Usman
 
Discrete Structures lecture 2
 Discrete Structures lecture 2 Discrete Structures lecture 2
Discrete Structures lecture 2Ali Usman
 
Oracle rac资源管理算法与cache fusion实现浅析
Oracle rac资源管理算法与cache fusion实现浅析Oracle rac资源管理算法与cache fusion实现浅析
Oracle rac资源管理算法与cache fusion实现浅析frogd
 

Andere mochten auch (20)

Database, 3 Distribution Design
Database, 3 Distribution DesignDatabase, 3 Distribution Design
Database, 3 Distribution Design
 
Database , 1 Introduction
 Database , 1 Introduction Database , 1 Introduction
Database , 1 Introduction
 
Database ,2 Background
 Database ,2 Background Database ,2 Background
Database ,2 Background
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data Integration
 
Fragmentation as a Part of Security in Distributed Database: A Survey
Fragmentation as a Part of Security in Distributed Database: A SurveyFragmentation as a Part of Security in Distributed Database: A Survey
Fragmentation as a Part of Security in Distributed Database: A Survey
 
Database , 5 Semantic
Database , 5 SemanticDatabase , 5 Semantic
Database , 5 Semantic
 
PL/pgSQL - An Introduction on Using Imperative Programming in PostgreSQL
PL/pgSQL - An Introduction on Using Imperative Programming in PostgreSQLPL/pgSQL - An Introduction on Using Imperative Programming in PostgreSQL
PL/pgSQL - An Introduction on Using Imperative Programming in PostgreSQL
 
MySQL InnoDB 源码实现分析(一)
MySQL InnoDB 源码实现分析(一)MySQL InnoDB 源码实现分析(一)
MySQL InnoDB 源码实现分析(一)
 
Database ,16 P2P
Database ,16 P2P Database ,16 P2P
Database ,16 P2P
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
 
Database ,10 Transactions
Database ,10 TransactionsDatabase ,10 Transactions
Database ,10 Transactions
 
Postgres MVCC - A Developer Centric View of Multi Version Concurrency Control
Postgres MVCC - A Developer Centric View of Multi Version Concurrency ControlPostgres MVCC - A Developer Centric View of Multi Version Concurrency Control
Postgres MVCC - A Developer Centric View of Multi Version Concurrency Control
 
Database ,14 Parallel DBMS
Database ,14 Parallel DBMSDatabase ,14 Parallel DBMS
Database ,14 Parallel DBMS
 
Lecture 1 ddbms
Lecture 1 ddbmsLecture 1 ddbms
Lecture 1 ddbms
 
InnoDB Internal
InnoDB InternalInnoDB Internal
InnoDB Internal
 
Database , 13 Replication
Database , 13 ReplicationDatabase , 13 Replication
Database , 13 Replication
 
Database ,7 query localization
Database ,7 query localizationDatabase ,7 query localization
Database ,7 query localization
 
Database ,11 Concurrency Control
Database ,11 Concurrency ControlDatabase ,11 Concurrency Control
Database ,11 Concurrency Control
 
Discrete Structures lecture 2
 Discrete Structures lecture 2 Discrete Structures lecture 2
Discrete Structures lecture 2
 
Oracle rac资源管理算法与cache fusion实现浅析
Oracle rac资源管理算法与cache fusion实现浅析Oracle rac资源管理算法与cache fusion实现浅析
Oracle rac资源管理算法与cache fusion实现浅析
 

Ähnlich wie Database , 15 Object DBMS

Database , 17 Web
Database , 17 WebDatabase , 17 Web
Database , 17 WebAli Usman
 
1 introduction ddbms
1 introduction ddbms1 introduction ddbms
1 introduction ddbmsamna izzat
 
1 introduction
1 introduction1 introduction
1 introductionAmrit Kaur
 
1 introduction DDBS
1 introduction DDBS1 introduction DDBS
1 introduction DDBSnaimanighat
 
computer fund-database presentation
 computer fund-database presentation computer fund-database presentation
computer fund-database presentationRakibul islam
 
Case Study: Implementing a Data Mesh at NORD/LB
Case Study: Implementing a Data Mesh at NORD/LBCase Study: Implementing a Data Mesh at NORD/LB
Case Study: Implementing a Data Mesh at NORD/LBHostedbyConfluent
 
Big Data (NJ SQL Server User Group)
Big Data (NJ SQL Server User Group)Big Data (NJ SQL Server User Group)
Big Data (NJ SQL Server User Group)Don Demcsak
 
Government GraphSummit: And Then There Were 15 Standards
Government GraphSummit: And Then There Were 15 StandardsGovernment GraphSummit: And Then There Were 15 Standards
Government GraphSummit: And Then There Were 15 StandardsNeo4j
 
Container Attached Storage with OpenEBS - CNCF Paris Meetup
Container Attached Storage with OpenEBS - CNCF Paris MeetupContainer Attached Storage with OpenEBS - CNCF Paris Meetup
Container Attached Storage with OpenEBS - CNCF Paris MeetupMayaData Inc
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song songLê Anh Trung
 
Adbms 1 object oriented modeling
Adbms 1 object oriented modelingAdbms 1 object oriented modeling
Adbms 1 object oriented modelingVaibhav Khanna
 

Ähnlich wie Database , 15 Object DBMS (20)

Database , 17 Web
Database , 17 WebDatabase , 17 Web
Database , 17 Web
 
1 introduction ddbms
1 introduction ddbms1 introduction ddbms
1 introduction ddbms
 
1 introduction
1 introduction1 introduction
1 introduction
 
Hpts 2011 flexible_oltp
Hpts 2011 flexible_oltpHpts 2011 flexible_oltp
Hpts 2011 flexible_oltp
 
1 introduction DDBS
1 introduction DDBS1 introduction DDBS
1 introduction DDBS
 
dmBridge & dmMonocle
dmBridge & dmMonocledmBridge & dmMonocle
dmBridge & dmMonocle
 
6-Query_Intro (5).pdf
6-Query_Intro (5).pdf6-Query_Intro (5).pdf
6-Query_Intro (5).pdf
 
RavenDB
RavenDBRavenDB
RavenDB
 
computer fund-database presentation
 computer fund-database presentation computer fund-database presentation
computer fund-database presentation
 
Case Study: Implementing a Data Mesh at NORD/LB
Case Study: Implementing a Data Mesh at NORD/LBCase Study: Implementing a Data Mesh at NORD/LB
Case Study: Implementing a Data Mesh at NORD/LB
 
AzureDocumentDB
AzureDocumentDBAzureDocumentDB
AzureDocumentDB
 
Big Data (NJ SQL Server User Group)
Big Data (NJ SQL Server User Group)Big Data (NJ SQL Server User Group)
Big Data (NJ SQL Server User Group)
 
Government GraphSummit: And Then There Were 15 Standards
Government GraphSummit: And Then There Were 15 StandardsGovernment GraphSummit: And Then There Were 15 Standards
Government GraphSummit: And Then There Were 15 Standards
 
Container Attached Storage with OpenEBS - CNCF Paris Meetup
Container Attached Storage with OpenEBS - CNCF Paris MeetupContainer Attached Storage with OpenEBS - CNCF Paris Meetup
Container Attached Storage with OpenEBS - CNCF Paris Meetup
 
nnnn.pptx
nnnn.pptxnnnn.pptx
nnnn.pptx
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song song
 
Adbms 1 object oriented modeling
Adbms 1 object oriented modelingAdbms 1 object oriented modeling
Adbms 1 object oriented modeling
 
Dunsire roadmap meeting proposal
Dunsire roadmap meeting proposalDunsire roadmap meeting proposal
Dunsire roadmap meeting proposal
 
Chp-1.pptx
Chp-1.pptxChp-1.pptx
Chp-1.pptx
 

Mehr von Ali Usman

Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer OverviewAli Usman
 
Islamic Arts and Architecture
Islamic Arts and  ArchitectureIslamic Arts and  Architecture
Islamic Arts and ArchitectureAli Usman
 
Database ,18 Current Issues
Database ,18 Current IssuesDatabase ,18 Current Issues
Database ,18 Current IssuesAli Usman
 
Database , 6 Query Introduction
Database , 6 Query Introduction Database , 6 Query Introduction
Database , 6 Query Introduction Ali Usman
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor SpecificationsAli Usman
 
Fifty Year Of Microprocessor
Fifty Year Of MicroprocessorFifty Year Of Microprocessor
Fifty Year Of MicroprocessorAli Usman
 
Discrete Structures. Lecture 1
 Discrete Structures. Lecture 1  Discrete Structures. Lecture 1
Discrete Structures. Lecture 1 Ali Usman
 
Muslim Contributions in Medicine-Geography-Astronomy
Muslim Contributions in Medicine-Geography-AstronomyMuslim Contributions in Medicine-Geography-Astronomy
Muslim Contributions in Medicine-Geography-AstronomyAli Usman
 
Muslim Contributions in Geography
Muslim Contributions in GeographyMuslim Contributions in Geography
Muslim Contributions in GeographyAli Usman
 
Muslim Contributions in Astronomy
Muslim Contributions in AstronomyMuslim Contributions in Astronomy
Muslim Contributions in AstronomyAli Usman
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor SpecificationsAli Usman
 
Ptcl modem (user manual)
Ptcl modem (user manual)Ptcl modem (user manual)
Ptcl modem (user manual)Ali Usman
 
Nimat-ul-ALLAH shah wali
Nimat-ul-ALLAH shah wali Nimat-ul-ALLAH shah wali
Nimat-ul-ALLAH shah wali Ali Usman
 
Muslim Contributions in Mathematics
Muslim Contributions in MathematicsMuslim Contributions in Mathematics
Muslim Contributions in MathematicsAli Usman
 
Osi protocols
Osi protocolsOsi protocols
Osi protocolsAli Usman
 

Mehr von Ali Usman (15)

Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
Islamic Arts and Architecture
Islamic Arts and  ArchitectureIslamic Arts and  Architecture
Islamic Arts and Architecture
 
Database ,18 Current Issues
Database ,18 Current IssuesDatabase ,18 Current Issues
Database ,18 Current Issues
 
Database , 6 Query Introduction
Database , 6 Query Introduction Database , 6 Query Introduction
Database , 6 Query Introduction
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor Specifications
 
Fifty Year Of Microprocessor
Fifty Year Of MicroprocessorFifty Year Of Microprocessor
Fifty Year Of Microprocessor
 
Discrete Structures. Lecture 1
 Discrete Structures. Lecture 1  Discrete Structures. Lecture 1
Discrete Structures. Lecture 1
 
Muslim Contributions in Medicine-Geography-Astronomy
Muslim Contributions in Medicine-Geography-AstronomyMuslim Contributions in Medicine-Geography-Astronomy
Muslim Contributions in Medicine-Geography-Astronomy
 
Muslim Contributions in Geography
Muslim Contributions in GeographyMuslim Contributions in Geography
Muslim Contributions in Geography
 
Muslim Contributions in Astronomy
Muslim Contributions in AstronomyMuslim Contributions in Astronomy
Muslim Contributions in Astronomy
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor Specifications
 
Ptcl modem (user manual)
Ptcl modem (user manual)Ptcl modem (user manual)
Ptcl modem (user manual)
 
Nimat-ul-ALLAH shah wali
Nimat-ul-ALLAH shah wali Nimat-ul-ALLAH shah wali
Nimat-ul-ALLAH shah wali
 
Muslim Contributions in Mathematics
Muslim Contributions in MathematicsMuslim Contributions in Mathematics
Muslim Contributions in Mathematics
 
Osi protocols
Osi protocolsOsi protocols
Osi protocols
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Database , 15 Object DBMS

  • 1. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/1 Outline • Introduction • Background • Distributed Database Design • Database Integration • Semantic Data Control • Distributed Query Processing • Multimedia Query Processing • Distributed Transaction Management • Data Replication • Parallel Database Systems • Distributed Object DBMS ➡ Object Models ➡ Object Distribution • Peer-to-Peer Data Management • Web Data Management • Current Issues
  • 2. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/2 Why Object DBMS Some applications require • storage and management of abstract data types (e.g., images, design documents)  rich type system supporting user-defined abstract types; • need to explicitly represent composite and complex objects without mapping to flat relational model; • need more powerful languages without the impedance mismatch.
  • 3. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/3 Fundamental Concepts • Object ➡ An entity in the system that is being modeled. ➡ <OID, state, interface> • OID: object identifier ➡ Immutable • State ➡ Atomic or constructed value ➡ Atomic values are instance variables (or attributes) ➡ Constructed values can be set or tuple • Interface ➡ State and behaviour ➡ Behavior captured by methods • Object states may change, but OID remains identical
  • 4. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/4 Fundamental Concepts (cont’d) • Type ➡ Domain of objects • Class ➡ Template for a group of objects defining a common type that conforms to the template • Example type Car attributes engine: Engine bumbers: {Bumper} tires: [lf: Tire, rf: Tire, lr: Tire, rr: Tire] make: Manufacturer model: String year: Date serial_no: String capacity: Integer methods age: Real replaceTire(place, tire)
  • 5. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/5 Fundamental Concepts (cont’d) • Composition (aggregation) ➡ Composite type (Car) and composite object ➡ Allows referential sharing – objects refer to each other by their OIDs as values of object-based variables ➡ Composition relationships can be represented by composition (aggregation) graph • Subclassing and inheritance ➡ Subclassing is based on specialization: class A is a specialization of class B if A’s interface is a superset of B’s interface. ➡ Inheritance: result of subclassing – class A’s properties consist of what is defined for it as well as the properties of class B that it inherits
  • 6. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/6 Object Distribution • New problems due to encapsulation of methods together with object state. • Fragmentation can be based on ➡ State ➡ Method definitions ➡ Method implementation • Class extent can be fragmented
  • 7. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/7 Fragmentation Alternatives • Horizontal ➡ Primary ➡ Derived ➡ Associated • Vertical • Hybrid • Path partitioning
  • 8. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/8 Horizontal Fragmentation • Primary ➡ Defined similar to the relational case • Derived ➡ Due to the fragmentation of a subclass ➡ Due to fragmentation of a complex attribute ➡ Due to method invocation
  • 9. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/9 Vertical Fragmentation • For a class C, fragmenting it vertically into C1, …, Cm produces a number of classes, each of which contains some of the attributes and some of the methods. ➡ Each fragment is less defined than the original class • Issues ➡ Subtyping relationship between C’s superclasses and subclasses and the fragment classes ➡ Relationship of the fragment classes among themselves ➡ Location of the methods when they are not simple methods
  • 10. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/10 Path Partitioning • Clustering all of the objects forming a composite object into a partition • Can be represented as a hierarchy of nodes forming a structural index ➡ Each node of the index points to objects of the domain class of the component object
  • 11. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/11 Object Server Architecture • Clients request “objects” from the server ➡ Single object or groups of objects can be returned • Server undertakes most of the DBMS services • Object manager duplicated ➡ Provides a context for method execution ➡ Implementation of object identifier ➡ Object clustering and access methods (at server) ➡ Implement an object cache
  • 12. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/12 Page Server Architecture • Unit of transfer between clients and server is a physical unit of data ➡ E.g., page or segment • DBMS services split between the client and the server • Servers typically do not have the notion of “object” • Clients have to do the conversion from an “object” to a physical unit and vice versa
  • 13. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/13 Cache Consistency • Avoidance-based ➡ Prevents access to stale cache data by ensuring that clients cannot update an object if it is being read by other clients ✦ Object in cache is stale if it has already been updated and committed to the database by a different client ➡ Stale data cannot exist in the cache • Detection-based ➡ Detect stale object access at a validation step at commit time ➡ Stale data is allowed to exist in the cache • Each can further classified based on when the client informs the server about writes ➡ Synchronous ➡ Asynchronous ➡ Deferred
  • 14. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/14 Alternative Cache Consistency Algorithms • Avoidance-based synchronous • Avoidance-based asynchronous • Avoidance-based deferred • Detection-based synchronous • Detection-based asynchronous • Detection-based deferred
  • 15. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/15 Object Identifier Management • Physical object identifier (POID) ➡ OID is equated with the physical address of the corresponding object ➡ Address can be disk page address and an offset from the base address + Object can be obtained directly from the OID - Parent object and all indexes need to be updated when object moves • Logical identifier (LOID) ➡ System-wide unique ➡ A mapping has to occur to map it to the physical address + Object can be easily moved - Indirection overhead
  • 16. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/16 Object Migration • Unit of migration ➡ Object state but not methods ✦ Requires invocation of remote procedures ➡ Individual objects ✦ Types may be accessed remotely or duplicated • Tracking objects ➡ Surrogates or proxy objects ➡ Placeholders: accesses to proxy objects are directed transparently by the system to the objects themselves at the new sites
  • 17. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/17 Distributed Object Storage • Object clustering ➡ Decomposition storage model ✦ Partition eachobject class into binary relations (OID, attribute) ✦ Relies on LOID ➡ Normalized storage model ✦ Stores each class as a separate relation ✦ Can use LOID or POID ➡ Direct storage model ✦ Multi-class clustering og objects based on the composition relationship • Distributed garbage collection ➡ Reference counting ➡ Tracing-based ✦ Mark and sweep ✦ Copy-based
  • 18. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/18 Object Query Processing • Similar approach to relational can be followed. • Additional difficulties ➡ Complexity of the type system ➡ Encapsulation makes knowledge of physical organization and access methods difficult ➡ Object structures are complex requiring path expressions for access
  • 19. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/19 Transaction Management • Difficulties resulting from the following requiremens ➡ Operations are not simple Read and Write ➡ Objects are not “flat” but complex and composite ➡ Access patterns are not simple ➡ Long running activities need to be supported ➡ Active object capabilities are sometimes required
  • 20. Distributed DBMS ©M. T. Özsu & P. Valduriez Ch.15/20 Correctness Criteria • Commutativity • Invalidation • Recoverability