0% found this document useful (0 votes)
53 views

Distributed Database 2

ss

Uploaded by

scribd_sandeep
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Distributed Database 2

ss

Uploaded by

scribd_sandeep
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Volume 2, Issue 4, April 2012

ISSN: 2277 128X

International Journal of Advanced Research in


Computer Science and Software Engineering
Research Paper
Available online at: www.ijarcsse.com

A Framework of Distributed Database Management Systems


in the Modern Enterprise and the Uncertainties removal
Prof. (Dr.) Anand K. Tri pathi
Head of Deptt. CSE &IT
SR Group of Institutions,CSE,Jhansi ,India
dr.aktripathi@g mail.co m

Ms.Monika Tri pathi


Asstt. Prof., Arya Kanya PG
College,Jhansi ,India
monikatripathi.d@g mail.co m

Abstract :This research paper studies the use of distributed database management systems (DDBM Ss) in the information
infrastructure o f modern organizations to reduce the uncertainties occurring in organization. The key purpose of the
research is to determine the feasibility and applicability of DDBMSs for today's business applications. The forces which
drove the selection of this topic were the improvements of distributed features in leading database management systems
(DBMSs) in recent years, as well as the potential of distributed databases to provide competitive advantages for
organizations for proper utilization of infrastructure to obtain the meaningful information.
Keywords: Distributed Database Management Systems: DDBMS, DBM S.
1. PRES ENT STATE OF KNOWLEDGE: Todays
business environment has an increasing need for distributed
database and client/server applications as the desire for
reliable, scalable and accessible information is steadily rising.
Distributed database systems provide an imp rovement on
communicat ion and data processing due to its data distribution
throughout different network sites. DDS makes not only
makes data access faster, but a single-point of failure is less
likely to occur, and it provides local control of data for users.
However, there is some comp lexity when attempting to
manage and control distributed database systems .
The information requirements of organizations and distributed
database technology both have grown very tremendously in
recent years. In fact, nearly all modern DBM Ss come standard
with powerful distributed features, but these features must be
implemented and administered by skilled professionals.
Distributed databases are much more co mplex than their
centralized database cousins, but when properly implemented
in the appropriate enterprise applications, they can provide
great benefits to the organizations they support.
Demands for DDBMSs
Prior to the popular acceptance of DDBMSs, corporations
normally relied on centralized databases designed to serve
very structured informat ion requirements. These centralized

databases had some characteristics in common. First, they


ran on powerful and expensive hardware that could
handle very large portions of a firm's data reliably.
Second, they were ad ministered by a small nu mber of
well-t rained people who could manage the organization's
computers to reduce the uncertainties occurring in
organizations [1].Third, the dedicated data lines forming
the corporate wide area network (WAN) had to be highly
reliable and have a large capacity, because any downtime
will preclude at least one site fro m operating, and every
operation had to be transmitted to and from the central
database in real t ime. These centralized databases could
provide adequate performance to firms able to work
around their shortcomings. These shortcomings include
the lack of flexibility in the application of the firm's
informat ion and the requirement to implement a single
point of failure for the entire enterprise.
This section explores the lessons learned about the
limitat ions of centralized database systems over the thirty
years they have been in general use. First the business
forces are explored. Each of these business issues has
generated informat ion technology requirements that
distributed database architectures are uniquely capable of
supporting. Second, the technol ogy issues are explored.
These have come about from advances in informat ion
technology that have made the centralized database model
less relevant in today's organizations.

Vo lu me 2, Issue 4, April 2012

Business Forces

www.ijarcsse.com

the organization's central databases and satisfying their


natural tendency not to share.

Geographic Dispersion
Geographic dispersion of organizations is not an entirely new
concept. Large firms have connected major reg ional offices to
their centralized databases using dedicated lines for years. The
difference now is that geographic dispersion is taken to greater
extremes to provide cost savings and improved contact with
the firm's customers [10]. Large regional offices are
increasingly replaced with smaller locations in all of the firm's
markets. This change greatly increas es the number of
dedicated lines which, if provided at the same service levels as
in the older centralized systems, could add up to an enormous
expense. Clearly, the traditional centralized database model
creates a problem for firms wishing to benefit by s uch
increased geographic dispersion.
Another aspect of the geographic dispersion problem is the
growing abundance of portable computer use by mobile
professionals. A common examp le of this is the traveling
salesperson using a laptop-based database to query available
inventory and take customer orders. The nature of this work
prevents a full-time network connection, and the database on
the mobile system must somehow be linked to the firm's
master database at regular intervals to update the distributed
copies of any data that has been changed. This is another case
where geographic dispersion has rendered the centralized
database architecture obsolete [11].
Geographically dispersed organizations require an architecture
that allows the bulk of data retrieval and updates to be
performed on fast and inexpensive local area networks
(LANs). This architecture should reserve the more expensive
WAN for data updates that are relevant to other sites. Mobile
users should have a copy of the data for their local use and an
efficient means to update using a part-time connection [12].

Information as a Resource
Business leaders today understand the importance of
informat ion as a business resource. With centralized database
systems, an organization's informat ion is maintained an d
controlled by a few highly skilled individuals at one location
[8]. Two major factors have led many business users to reject
the centralized database model: the natural tendency for
humans not to share and the introduction of personal computer
(PC) -based DBMSs powerful enough to handle many
concurrent users. Armed with such tools, departments and
workg roups can easily build their own databases, wresting
control of the information resource fro m the ad min istrators of

2012, IJARCSS E All Rights Reserved

The explosion of individual databases running on PC


platforms can provide new opportunities to heads of
departments, but may also pose problems for the
organization as a whole. Information that could benefit
the entire organization often becomes out of reach for
users unable to access it or unaware of its existence.
Additionally, because of the cheaper hardware and
software used, and generally lower skills of the personnel
administering these systems, reliability can be
significantly less than with centralized systems. Data
inconsistency is another problem that occurs in such an
environment, as the same data is stored in many databases
with no system for managing the mult iple copies [12].
The centralized and decentralized models described above
both generate major problems for large organizations.
Some type of architecture that provides the advantages of
both without the drawbacks would be ideal[2]. This
architecture should allow decentralized use of data, while
providing for database admin istration that can be
performed by personnel with the interests of the whole
firm in mind [2].
Corporate Rightsizing
Modern corporations expand and contract frequently as
they respond to changing competitive pressures. A study
of 3,628 co mpanies done by Cascio and Young reported
in Morris, and found that one third had fired at least 15%
of their emp loyees during the period of the study . The
study also concluded that in most cases, the companies
had expanded to their original sizes, often within less than
three years. Such activity is referred to as corporate
downsizing or rightsizing, not to be confused with the
same terms applied to in formation technology and clientserver systems. It is often through the use of informat ion
technology that executives identify such business
opportunities and transmit the decisions and plans to
make the changes very rapidly. Ironically, it is often the
informat ion technology resource of an organization that is
usually the least able to respond to such rightsizing
decisions.
Centralized databases running on complex and expensive
mainframes and minico mputers are usually very difficult
to scale to high degrees. Adding or removing processing
capacity and storage can be expensive and difficult. Many
organizations require a scalable database system that can
allo w system administrators to handle changing demand
with nothing more than the incremental purchase or
removal of commodity hardware and software. Such a
solution should provide a growing firm with a solution

Page | 61

Vo lu me 2, Issue 4, April 2012

that allows rapid integration into the existing architecture and


a predictable increase in capacity and performance [7].
Technol ogy Forces
Infusion of PCs and LA Ns in the Workplace:
The stage for distributed databases was set in the 1980s when
PCs began to take hold of the corporate desktop in large
numbers. The natural extension of these machines being on
many desks was to connect them using local networks and
servers. Office fileservers provided small organizations with
decentralized server power. The culture and infrastructure of
corporate computing reflected an increasingly decentralized
bias, driven in many cases by end-users who began to
understand and explo re the power of decentralized co mputing
Increasing Demands of the Internet
The growth in Internet use and the explosion of web pages
with real-t ime informat ion have dramatically increased the
demands on business web sites in recent years. Web pages full
of dynamic
BROAD OUTLINES OF THE WORK:
Distributed database systems are based upon several models
and their imp lementations can include a number of d ifferent
features. This has developed from the many varied situations
and requirements organizations are faced with in putting the
technology to use. The topics described below are key to
understanding the capabilities and li mitati ons of distri buted
database systems.
Fragmentation
The frag mentation technique for distributed databases
involves splitting the centralized database into portions and
moving them to different locations. This distribution is
accomplished by horizontal and/or vertical partitioning. No
data is stored redundantly with the exception of primary keys
in the case of vertical frag mentation. Using the relational
model, horizontal frag mentation is acco mplished by separating
rows and vertical frag mentation is accomplished by separating
columns. Data is normally frag mented according to the section
of the organization wh ich uses or modifies the data most
frequently. For examp le, a firm may use a department code
field to determine which department is responsible for each
record and where the data should physically reside in a
horizontally frag mented system.
Key principles of the frag mented distribution model are that
only one copy of the data exists in the database, and that
ownership and ability to update the database are shared. This

2012, IJARCSS E All Rights Reserved

www.ijarcsse.com

model is similar to the centralized model in that the data


is always consistent and current. The only redundancies
exist with primary key fields when using vertical
frag mentation. Frag mented database systems are more
complex than centralized systems, but simpler than
replicated systems. The issue of a single point of failure is
reduced, but not eliminated. Netwo rk usage is generally
lower in frag mented systems than in centralized systems.
Failure Recovery
One of the advantages of replicated database systems is
that they can provide a level of fau lt-tolerance beyond
what can be achieved through more trad itional means
such as the use of redundant array of inexpensive disks
(RAID). By replicating the databas e so that it is on two
separate machines in different physical locations on the
network, the probability that failures will cause a loss of
service is significantly reduced. Two options for
implementing failure recovery through database
replicat ion are available: warm standby and hot standby.
Warm standby uses asynchronous replication to maintain
the standby server in a state nearly consistent with that of
the primary server. Due to the lag between transactions
being committed on the primary server and replication to
the standby server, a small nu mber of transactions are
normally lost during a primary server failure and
switchover to the standby server.
Hot standby uses synchronous replication to maintain the
standby server in a state always consistent with the
primary server. Fro m an availab ility perspective this is the
preferred solution, but the higher costs and potential
lower performance of synchronous replication databases
cause many organizations to select a warm standby
solution. Buretta recommends a combination of local hot
standby, normally RAID, and offsite warm standby
server.
PRIMARY WORK DONE ON THE LINES:
In the earliest days of centralized databases, professionals
normally used a one-size fits all approach to DBMS
software.
As database systems grew, increased in importance to the
organization, and began operating in diverse applications,
it became apparent that DBMSs should be specialized.
One of the major shifts occurred when data centers
running mainframes with large relational databases
optimized for transaction speed began to notice poor
performance during t imes when reports and queries were
processed. It was at this point that the different

Page | 62

Vo lu me 2, Issue 4, April 2012

requirements of online transaction processing (OLTP) and


online analytical processing (OLAP) became apparent. Some
organizations responded to the performance issues by
restricting OLAP to late night and other off-peak times. Th is is
less than an ideal solution as it limits the use of OLAP for the
competitive advantage it should provide, and may be
impossible when an organization operates round the clock or
in many time zones.
Security
Implementing effective security in a widely distributed
database is no small task. It is observed that possible security
services in a multit ier architecture include authentication,
authorization, nonrepudiation, confidentiality, and data
integrity. Authentication is the process of having each user,
host, or application server prove it self that who they are
really. Authorization is the process of ensuring that each
authenticated user has the necessary permission level to
perform the requested tasks. Nonrepudiation is ensuring that
authenticated and authorized users may not deny that they
used a designated resource. Confidentiality prevents
unauthorized users from accessing sensitive data. Data
integrity prevents data fro m being mod ified in an unauthorized
manner (11).
This makes some reco mmendations for implementing security
in a rep licated database environment. The first is that all stored
and/or displayed passwords must be encrypted so that
unauthorized persons and processes may not obtain them.
Pseudo-user accounts, those established for systems to
automatically log on to the network, are common in
distributed database environments. Buretta points out that
these accounts must comply with the firm's security policies
and knowledge of their passwords should be limited. All file
systems, raw devices, and/or database structures used to store
queued data and/or messages must be secure. This item points
out the many avenues in a distributed system available to
unauthorized users, which must be protected. Finally,
encryption techniques must be integrated within the
replicat ion service. This prevents interception of the data
transmitted over the network (12).
This makes the point that distributed database systems may
use either application- or data-level security. Application-level
security, as its name suggests, is programmed into the
application logic. Each application is responsible for
governing user access to the data. Data level security is
implemented in the database engine. Profiles of acceptable
data items and operations are stored and checked by the
database engine against the end-user's permission level on
each database operation. Burleson recommends that
application-level security be removed and replaced with data
level security to make the distributed database more secure .
The argument fo r this is that a skilled end-user with a

2012, IJARCSS E All Rights Reserved

www.ijarcsse.com

workstation and commonly available develop ment tools


could easily write an application that does not follow the
organization's security policy [11]. Such a security hole
may be created either unintentionally by a well-meaning
emp loyee or intentionally by someone with malicious
intent. When data-level security is imp lemented, such
security holes are not possible (11)
The Future Prospects for DDBMSs: The issues above
demonstrate that a good DDBMS must provide security
services, and that organizations must know how to
properly imp lement them [4]. As data is distributed and
end-users are given more proces sing power, potential for
security problems increases. Organizat ions with
distributed databases must be competent and vigilant in
their execution of security.
DDBMS technology has potential, but its continued
growth in popularity is not guaranteed. Just as DDBMSs
grew in popularity with client-server, the potential for
further growth in their popularity will likely be tied to
client-server. The fo llo wing section examines the
potential for future success or failure of DDBMS systems
with a focus on client-server trends as indicators of what
the future may hold.
Growth of Internet Computing
Experience with distributed database client-server
architectures has shown that the complexity and expense
of these approaches can be overwhelming. As a result,
some firms have decided to go back in the direction of
centralized databases. Professional have responded to this
demand by providing solutions using servers based on
mainframe or minico mputer platforms and thin clients,
which in most cases run only a web browser. This
architecture is sometimes referred to as Internet
computing.
Proponents of Internet computing claim that simplify ing
the distributed components of the architecture and moving
data to one professionally-managed location provides
higher reliability and lower operating costs. One of the
original argu ments for client-server was the ability to
replace character-based terminals with GUI-based
workstations, which are mo re flexib le and easier to use.
Internet computing retains the benefits of a central data
store and GUI-based workstations. The benefits of
Internet computing may generate stiff co mpetit ion for
widely distributed database systems.
Immaturity of Client-Server

Page | 63

Vo lu me 2, Issue 4, April 2012

Although client-server technology has been in widespread use


for over a decade, some argue that it is not yet developed to
the level to provide sufficient advantages to businesses
implementing new systems. A panel of industry experts
speaking at the Client-Server Leadership Foru m in Toronto in
1996 concluded that the client-server market is still in
adolescence. The panel reiterated the popular view that threetiered client-server systems are far superior to two-tiered
systems. Three-tiered architectures require more resources to
implement, but are generally mo re scalable and allow for
thinner, easier to maintain clients than two-tiered architectures
does. The panel saw the client-server industry as immature,
due to the low numbers of three-tiered systems
implementation. Many professionals felt that until three-tiered
systems become the norm, the benefits of client-server
architectures cannot be realized. So me of the members felt
that this weakness may lead to client-server being replaced by
Internet computing Lack of DDBMS Standards :
A distributed database needs these four issues for DDBMSs to
reach at their full potential. 1. Hardware independence, 2.
Operating system independence, 3. Net work independence,
and 4. Database independence. Today's DDBMS products are
still do not meet these four standards.

www.ijarcsse.com

diverse strategies to provide an indication of the future


offerings that may beco me available in the future.
Ability of DDBM Ss to meet Business Requirements
These section
discuses
organizational
recently
implemented distributed databases and the results they
have obtained. These cases are representative of the use of
distributed databases in business today [9]. Each case
illustrates specific capabilit ies of today's DDBMSs. Later
this section will analyze the capabilit ies of DDBMS
products to meet the business and technology demands for
them outlined earlier.
1. Analysis
Recent developments in DDBMS technology, many of the
business and technology requirements for distributed
databases can be met. Belo w are the business and
technology requirements discussed earlier with an
analysis of the ability of today's DDBMS products to
adequately meet the needs.
2. Geographic Dispersion

DDBM S technology is relatively new, and is still suffering


fro m professionals fighting to develop and hold on to
proprietary features. Today the situation is improving, but
cross-vendor connectivity is sometimes limited, especially for
legacy systems that do not imp lement newer standards.
DDBMSs Currently Available
Several years ago finding the right tool for imp lementing
distributed databases was a challenge due to the lack of
DDBMSs available. Today distributed features are common in
the latest DBMS offerings from all major vendors. In fact, it is
rare for DBM Ss with distributed features to be referred to as
"distributed" databases at all - the feature is so prevalent that it
does not distinguish one product from another. The major
differences between products now are the technical details of
how the data distribution is performed and the special features
the DBMS provides.
The DBMS market is fiercely competitive, with no one
professional dominating completely. According to Dataquest
figures reported in Computer Reseller News, the 1998
database license revenue leaders were IBM with 32.3%,
Oracle with 29.4%, M icrosoft with 10.2%, Informix with
4.4%, and Sybase with 3.5%. IBM 's lead is due primarily to its
dominance in the mainframe and AS/400 platforms; on all
other platforms Oracle is the leader. This section first provides
an overview of features common among today's leading
distributed database product offerings. Later it examines the
differences between each vendor's products as well as their

2012, IJARCSS E All Rights Reserved

DDBMS vendors have done a remarkable job of meet ing


the demands of businesses to support their geographically
dispersed operations. Many of the advances in this area
are due to the work in making efficient use of network
connections. Network loads resulting fro m replication
activity in recent versions is significantly reduced.
Surridge Dawson's use of ISDN to replicate hundreds of
thousands of transactions in only two hours every day
illustrates this point. Replication to small client databases
using occasional dial-up connections, typically with
laptop computers, is also an area where recent work on
lightweight replicating DBMS versions has provided
organizations with a powerful tool for meet ing the need to
support mobile workers. W ith a careful analysis of
business requirements and proper network design,
DDBMSs can support most geographically dispersed
business operations.
3. Control of the Information Resource
DDBMSs now provide information managers with a
means for centrally controlling and exp loiting informat ion
scattered by server proliferation. Robust tools for
handling heterogeneous server platforms and replication
that is transparent to legacy applications are key factors in
this. Northwest Airlines is a good examp le of how
organizations can use the latest distributed database
products to leverage existing hardware and software
originally meant for use by only one element of the

Page | 64

Vo lu me 2, Issue 4, April 2012

www.ijarcsse.com

organization to make the entire organization more co mpetit ive


[5]. Because the distributed database model works well with
centralized planning and decentralized operations, database
designers and administrators can maintain control of the firm's
informat ion while allowing it to be used flexibly.

the present and future needs of the firm can be met. This
is another area where DDBMS features will never replace
talented people.

4. Mergers and Acquisitions


The distributed database products available now can facilitate
mergers and acquisitions, especially if the organization is
anticipating such activity and plans ahead. However, the
previously cited experiences of Pricewaterhouse and other
large corporations attempting to merge informat ion resources
with other firms on short notice highlights the limitations of
DDBMSs and middleware to solve very complex problems [6].
Issues with different database schema, inco mpatible network
infrastructure, and pressure to implement a solution rapid ly are
factors that will pose significant challenges to a smooth
merger of information resources for many years to come. In
these cases DDBMS software features are no substitute for
high quality personnel and proper planning.

Sea-Land Services is in a business normally considered


low-tech, but it has exploited the Internet as a source of
competitive advantage through its web site that allows
customers to track shipments and enter bookings online.
This is an examp le of new online services increasing
loads on database servers as large numbers of firms
leverage the Internet to provide improved service. By
replicat ing the relevant data to a server dedicated for
providing service to the web site, firms can reduce the
impact of this increased demand on internal operations
while not losing online customers as a result of excessive
page generation times. DBM S developers have latched on
to the Internet as a market for their products, and we will
continue to see an increase in the power of these products
to support e-business on the Internet.

Corporate Rightsizing

CONCLUS ION:

DBMS professionals continue to make advances in the


scalability of their products - both in the capacity of individual
servers and the quantity of distributed servers that may be
included in a distributed database [3]. Modern database
products give firms various options for growing or reducing
their deployed databases. E-Plus is an examp le of a firm that
was able to manage explosive growth while staying with one
DBMS product family. Replication allows organizations to
easily handle moving into new market areas. Surridge
Dawson, for examp le, could open a new warehouse quickly by
adding another slave server identical to the 21 it already has
and connecting it with commercially available ISDN service.
Current DDBMSs provide scalability adequate for most
business applications, and the emphasis placed on this by
DDBMS developers will ensure that those available in coming
years will allow high degrees of scalability.

All of the major DBM S developers have made significant


improvements to their newer products in the area of
handling high loads of simu ltaneous OLTP and OLAP
operations on the same server. Recent advances such as
improved use of multiprocessor hardware, multithreading,
and row-level locking have allowed this improved
performance. However, there are still OLAP applicat ions
that generate such high sys tem demands that they cannot
function together effectively with OLTP applications on
the same server. The replicat ion features of today's major
DBMSs fill this need nicely. Firms can use asynchronous
replicat ion to maintain an OLA P server separate from the
OLTP server and provide high performance for both
applications. Future advances in individual server
capabilit ies to simu ltaneously support OLTP and OLAP
plus improved replication performance will mean that IT
managers will not need to compro mise to provide high
performance in both these areas.

Client-Server Systems
The latest versions of DDBMSs and middleware make a
developer's task of implementing three-tier client-server
architecture much simp ler. Many of the components that
formerly required a heavy programming effort are now
available in off-the-shelf versions robust and flexible enough
to handle most tasks. Organizations that integrate such
products into their information arch itecture will reap the
benefits of three-tier client-server. These architectures will
allo w for more flexib ility and the ability to rapidly take
advantage of business and technology opportunities that arise
in the future. However, three tier client server systems will
always require skilled planning and imp lementation to ensure

2012, IJARCSS E All Rights Reserved

Demands of the Internet

References
1) Prof. (Dr.) Anand K. Tripathi and Mrs. Monica
Tripathi: MIS Uncertainties and the Computer Support:
An Analytical Approach, Proceeding of the National
Conference on Next Generat ion Co mputing Technology,
at ITS Ghaziabad publication wisdom publication, Delh i16-17 Oct-2008.,edition-3,vol-1

Page | 65

Vo lu me 2, Issue 4, April 2012

2) Prof. (Dr.) Anand K. Tripathi and Mrs. Monica Tripathi:


A Frame: Why Information System Fails, Proceeding of the
National Conference on Managing Co mp lexity in
Informative World. publicat ion Bh ilai Institute of
Technology, Durg, Bhilai (CG) dated 7-8 Nov.-2008. edition1,vol-1,pg.112-115

3) Prof. (Dr.) Anand K. Tripathi and Mrs. Monica Tripathi ,


AICTE Sponsored, National Conference on Next generation
computing & Info rmation systems at Model Institute of
Engineering & Technology, Jammu, Feb.14-15, 2009. edition2,vol-1,pg. 724-731

4) Prof. (Dr.) Anand K. Tripathi and Mrs. Monica Tripathi


,Paper A Framework :A Ro le of In formation Technology for
Decision Support System, CSI Sponsored National level
Conference on Cutting Edge Co mputer and Electronics
Technologies under TEQIP organized by
Co llege of
Technology, GB Pant University, Pant Nagar,14-15 Feb.2009,
edition-4,vo l-1, ,pg. 915-919

www.ijarcsse.com

10. Cost Benefit Analysis against Computerization of


Oranizat ion.Journal Prestige Institute of Management,
Dewas (MP) Vo l.-1 No. 1,MPENG00969/12/1/ 2009TC,Jan. 2010 , edition-1,vol-1,,pg. 724-731
11. Data Security levels for Co mputerized MIS
Artificial Intelligence & its Applications (AIA 2009) ,
Depart ment
of
Co mputer
Science
&
Engineering, Faculty of Engineering & Technology, RBS
College, Bichpuri, Agra (UP),
12-13
September
2009, ed ition-1,vol-1, ,pg. 555-559

12. Role of IT Infrastructure for Business Transformation


Proficient-An
International
Journal
of
Management, Malviya Nagar, Jaipur,Rajastan ,ISSN
No.0975-475X,Vo l.-1,July-Dec.-2009 (Referred Based),
edition-4,vo l-1, ,pg. 789--793

5). (Dr.) Anand K. Tripathi and Mrs. Monica Tripathi ,


National level Conference on Co mputer Intelligence at
Pioneer Institute, Indore, May-2009,Ediotion-1,Vo l.-1, ,pg.
724-729
6). (Dr.) Anand K. Tripathi and Mrs. Monica Tripathi Paper
Information Technology to Transform the Business
Proceeding of National Conference on Next Generat ion
Technologies for Informat ion Management (NGTIM-2009)
,7th Nov.-2009 ,organized by ITS-Management & IT Institute,
Ghaziabad (UP),ISBN :978-81-89547-69-1, edit ion-1,vol-1,
,pg. 1724-1731
7) Informat ion Technology and Structuring Of Organization:
Information System Research Published in IMSEC
International Journal of Research IMS Co llege Engineering,
Ghaziabad, Vol.-1 July-Dec.-2009 (Referred Based) edition1,vol-,1, ,pg. 925-928
8) Impact of High Professional Teaching: Informat ion
Technology to Globalize the Business Published in
International Journal on Computer Engineering and
Information Technology, Bh ilai, ISSN 0974-2034 (Referred
Based), edition-1,vol-1, ,pg. 815-818
9)
Knowledge, Skills and Abilities: Recruit ment IS/IT
Professionals
in
Fast
Changing
Business
Landscape Published in International Journal on Computer
Engineering and Information Technology, Bhilai, edition1,vol-1, ,pg. 606-609

2012, IJARCSS E All Rights Reserved

Page | 66

You might also like