DBMS Unit 5
DBMS Unit 5
o Distribution:
o Autonomy:
It reveals the division of power inside the Database System and the degree of autonomy
enjoyed by each individual DBMS.
o Heterogeneity:
It speaks of the similarity or differences between the databases, system parts, and data
models.
o Distribution:
o Autonomy:
It reveals the division of power inside the Database System and the degree of autonomy
enjoyed by each individual DBMS.
o Heterogeneity:
It speaks of the similarity or differences between the databases, system parts, and data
models.
Distributed Data Storage:
There are two methods by which we can store the data on different sites:
o Replication:
This method involves redundantly storing the full relationship at two or more locations.
Since a complete database can be accessed from each site, it becomes a redundant
database. Systems preserve copies of the data as a result of replication.
This has advantages because it makes more data accessible at many locations.
Additionally, query requests can now be handled in parallel.
However, there are some drawbacks as well. Data must be updated frequently. Any
changes performed at one site must be documented at every site where that relation is
stored in order to avoid inconsistent results. There is a tonne of overhead here.
Additionally, since concurrent access must now be monitored across several sites,
concurrency control becomes far more complicated.
o Fragmentation:
According to this method, the relationships are divided (i.e., broken up into smaller
pieces), and each fragment is stored at the many locations where it is needed. To ensure
there is no data loss, the pieces must be created in a way that allows for the reconstruction
of the original relation.
Ways of fragmentation:
o Horizontal Fragmentation:
In Horizontal Fragmentation, the relational table or schema is broken down into a group
of one and more rows, and each row gets one fragment of the schema. It is also
called splitting by rows.
o Vertical Fragmentation:
In this fragmentation, a relational table or schema is divided into some more schemas of
smaller sizes. A common candidate key must be present in each fragment in order to
guarantee a lossless join. This is also called splitting by columns.
Sure! Here are explanations of flow control, encryption with a public key, SQL injection,
and statistical databases in DBMS:
2. Flow Control:
Public key encryption, also known as asymmetric encryption, involves using a pair of
keys – a public key and a private key. These keys are mathematically related:
- Public Key : This key is shared openly and can be used by anyone to encrypt a
message.
- Private Key : This key is kept secret by the owner and is used to decrypt
messages encrypted with the corresponding public key.
Process :
1. Encryption : The sender uses the recipient's public key to encrypt the message.
2. Decryption : The recipient uses their private key to decrypt the message.
Public key encryption ensures confidentiality since only the holder of the private key can
decrypt the message encrypted with their public key. It's widely used in securing
communications, digital signatures, and authentication.
4. SQL Injection:
Key Features :
- Aggregation : Provides aggregate functions and summary statistics.
- Privacy Protection : Implements techniques to prevent inference attacks that could
disclose sensitive individual data from statistical outputs.
- Query Support : Optimized for complex queries that involve statistical
computations.