logo
user
  • Sign in
  • Sign up

Advanced Database

4 Pages

0 Downloads

Words: 1325

Date added: 18-12-14


rated 4.6/5 based on 19 customer reviews.

Type:

Level: high-school

Category:

open document save to my library

Introduction

An advanced database is involved in gathering of data that is planned so that it can be easily retrieved, accomplished and reorganised as well. The advanced technology has greatly evolved from peer to peer, peer to server and from server to cloud base system. However the advanced database system has different pros and cons within. Some of the advantages of this database system include reduced costs, saves on time consumption, and allows easier retrieval of data. Some of the most important configurations used in advanced database include the Network topology and the backbone system.

Peer-to-Peer was established for substantial courtesy starting from both invention and academic world as a form of circulated computation lying between the traditionally distributed systems and the web. Peer to server this has greatly changed from two peers (computers which were used which were used to generate their resources in a decentralized manner thus, opting to bring difficulties. Therefore the peer was transformed to a server which operated in a centralised manner which enabled the server to serve many clients. Also the advanced database system has evolved to cloud based system which relay on sharing of computing resources other than having personal resources or devices as well.

A physical topology refers to the physical design of networks, the cabling system design used to link devices. This mentions to the design of? electrics, the sites of nodules, and the acquaintances in the midst of the nodules and the wiring (Shi, Lo, & Qian, etal. 2016). The corporal topology of a system is unwavering by the competences of the net entree devices and mass media, the glassy of resistor or culpability acceptance is anticipated, plus the charge allied with wiring or satellites paths. This topology relationship aids in database storage and maintenance of the available nodes and the links in the networks and characteristics. Examples include Mesh, Star, Bus, Ring and Star topologies.

Mesh topology

This is one of the networks system in which the networks are linked with many terminated interconnections between net nodes. There is joining of nodes in this systems through use of a circuit. Mesh Topology is therefore divide into the full mesh and partial mesh topologies. Full mesh topology mainly arises when all cables within this network system has a path linked to nodules within it. This network topology therefore lavish to contrivance but in this scenario it ends up cropping the utmost volume of compensation. On the other hand, a partial mesh topology is less expensive for implementation and crops fewer termination as compared to full mesh topology. In this topology, specific lumps are structured in a full mesh system while others are linked to one or two nodes within the system.

Star Topology

It is a star-like network, in which the hub (main computer) links the devices. The nodes interconnect from lump to the other by paving data through the hub.one major merit for this topology is that, one faulty of the node within its network system does not interfere with the rest of the system. Its core demerit is that if the hub fails, the entire system does not function.

Bus Topology

A bus topology is a centralized cable with a main wire that is used to link all the devices on a Local area Network. The bus topology can also be referred as the backbone of the network. This network is fairly cheap and easier to connect in minor systems. As compared to star topology, the bus topology requires less cables thus making it easier to connect a device. However the bus topology has got its own demerit which occurs when a wire break down therefore no transmission data will occur and sometimes the problem cannot be easily retrieved thus causing 7the network to shut down.

Ring Topology

This topology is also a Local area network. However, all its nodes are connected in a close loop. This therefore indicates that messages travels around the ring network with which every node within the topology reads each messages that has being addressed. The ring topology has got one main merit which is it can span large distances compared to any other network topology since each of its nodes regenerates message as they pass through them.

Tree Topology

A tree topology is also referred as the hybrid topology which involves a combination of both bus and star topologies. In this topology a group of star network are linked along the bus prop cable. This system is best suited for huge processor networks since the topology rifts the entire net into small parts which can be effortlessly managed. The topology has several demerits one of the major being that the interconnection mainly relies on the hub that is on the middle and whenever this hub fails it leads to corruption of the entire network system.

Constraints

A constraints is said to be an enforcement of the data type which is involved in updating, insertion and deletion from the table. The general purpose for these constraints is to maintain the required data integrity during data updates, deletion and insertion into a given table.

Constraints are further used to constrain data and also used to enforce a referential integrity and ensure security of data within the advanced database system. They also prevent incomplete data storage within the database system.

There several types of constraints which include:
  • Primary key: this is a constraints that is mainly used to uniquely identify each records within the database.
  • Foreign key: it is a constraints through which values from the specified columns must referenced from the existing record in another table
  • Not null: in this constraints where each value within the specified column must be NULL.
  • Unique constraints: values in specific columns must be unique for each row in the table.
  • Check: in this constraints a mien is itemised and it must evaluate the truth for a constraints for a constraint to be specified.

A script programme to create a database table

In database a table is derived as a set of values and it consist of vertical columns and the horizontal rows having the cell being a unit in which the column and the row conjoins. A table tends to have a specified no of columns and any given number of rows.

Below is a script program to create a database table:

Backbone System

A backbone is a computer based network that comprises the number of connectivity amongst its devices such as the hubs, circuits and the connectors. This network aims at providing a way for interchange of information between various local area networks. This system aids in easy access of stored information from the database thus reducing time wastage when one needs to retrieve any given information from the database system .With the advanced technology backbone system has made a great contribution in improvement of database.

Conclusion

A database system enables one to store, organise and manage a huge expanse of information within the developed software. Making use of the database system helps in rising the effectiveness of business acts and declines the overall costs. They are also important to the organizations and businesses since they provide an efficient technique for managing numerous types of data. Examples of data that can be easily managed in the database include: employee records, student records, payroll, accounting, project management, and catalogue and library records. The database system also saves on time consumption since data is computerized thus little time is consumed when retrieving data from the data base as compared to the manual way of retrieving data.

References

Shi, Y., Lo, D., & Qian, K. (2016, June). Teaching Secure Cloud Computing Concepts with Open Source CloudSim Environment. In? Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual? (Vol. 2, pp. 247-252). IEEE.

https://upload.wikimedia.org/wikipedia/commons/9/97/NetworkTopology-Mesh.svg

https://www.computerhope.com/jargon/s/startopo.htm

https://www.computerhope.com/jargon/b/bustopol.htm

https://cherlyndeluna.wordpress.com/2011/04/28/ring-topology

https://fcit.usf.edu/network/chap5/chap5.html"

Read full document← View the full, formatted essay now!
Is it not the essay you were looking for?Get a custom essay exampleAny topic, any type available
banner
x
We use cookies to give you the best experience possible. By continuing we'll assume you're on board with our cookie policy. That's Fine