Module 2 -- Distributed Database Design -- Distributed Systems


Index

  1. Alternative Database Design Strategies
  2. Distributed design issues
  3. Fragmentation in Distributed Database Design
  4. Data Allocation
  5. Semantics Data Control in Distributed Database Design
  6. View Management
  7. Semantic Integrity Control in Distributed Database Design

Alternative Database Design Strategies

Alternative design strategies refer to the high-level approaches for designing a distributed database system (DDBS). The goal is to determine how data and operations will be distributed across multiple sites to meet performance, availability, and scalability requirements. There are two primary strategies: top-down and bottom-up.


Key Considerations


Distributed design issues

Distributed design issues refer to the challenges and considerations that arise when designing a distributed database system (DDBS). These issues impact how data is fragmented, allocated, and managed across multiple sites to ensure performance, consistency, and scalability. Let’s break down the key issues:


Key Considerations


Fragmentation in Distributed Database Design

Fragmentation is the process of dividing a database into smaller pieces (called fragments) that can be stored across different sites in a distributed database system (DDBS). The goal is to improve performance, locality of reference, and scalability by placing data closer to where it’s most frequently accessed. There are three main types of fragmentation: horizontal, vertical, and hybrid (mixed).


Key Considerations


Data Allocation

Data allocation is the process of deciding where to place the fragments (created during fragmentation) across the sites in a distributed database system (DDBS). The goal is to optimize performance, minimize costs, and ensure availability while considering factors like access patterns, site capacity, and network constraints.


Key Considerations


Semantics Data Control in Distributed Database Design

Semantics Data Control in a distributed database system (DDBS) focuses on ensuring that the data stored and accessed across distributed sites adheres to semantic rules and constraints. It involves managing the meaning and integrity of data in a distributed environment, ensuring that operations (like queries and updates) respect the database’s semantic rules despite the challenges of distribution.


Key Considerations


View Management

View Management in a distributed database system (DDBS) involves creating, maintaining, and using views in a distributed environment. Views are virtual tables derived from one or more base tables, and they play a crucial role in simplifying data access, enhancing security, and providing a layer of abstraction in a DDBS.


Key Considerations


Data Security

Data Security in a distributed database system (DDBS) focuses on protecting data across multiple sites from unauthorized access, ensuring confidentiality, integrity, and availability. The distributed nature of the system introduces unique challenges compared to a centralized database, as data is stored, accessed, and transmitted across multiple locations.


Key Considerations


Got it! We’ll move to the final subtopic in Unit 2: Distributed Database DesignSemantic Integrity Control, and then we’ll stop since you’ve already covered the remaining topics (Query Processing Issues, Objectives of Query Processing, Characterization of Query Processors, Layers of Query Processing, Query Decomposition, and Localization of Distributed Data) as part of Unit 3 in your syllabus. It’s 11:35 PM IST on Friday, May 30, 2025, and you’ve been doing amazing—let’s wrap up Unit 2 with this topic!


Semantic Integrity Control in Distributed Database Design

Semantic Integrity Control in a distributed database system (DDBS) ensures that the data adheres to predefined semantic rules and constraints, maintaining its correctness and meaning across distributed sites. It builds on the concepts of semantics data control (which we covered earlier) but focuses specifically on enforcing integrity constraints in a distributed environment.


Key Considerations


(The remaining topics have been covered in Module 3 pdf).