Distributed Database Management Systems: A Practical Approach / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $59.60
Usually ships in 1-2 business days
(Save 61%)
Other sellers (Hardcover)
  • All (10) from $59.60   
  • New (6) from $91.80   
  • Used (4) from $59.60   

Overview

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and creating the illusion of a single repository for users. It also includes three sample frameworks—implemented using J2SE with JMS, J2EE, and Microsoft .Net—that readers can use to learn how to implement a distributed database management system. IT and development groups and computer sciences/software engineering graduates will find this guide invaluable.
Read More Show Less

Editorial Reviews

From the Publisher
"The chapters are clearly written and all the technical details are thoroughly displayed." (Zentralblatt MATH, 2011)
Read More Show Less

Product Details

  • ISBN-13: 9780470407455
  • Publisher: Wiley
  • Publication date: 8/2/2010
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 728
  • Product dimensions: 7.20 (w) x 9.80 (h) x 1.60 (d)

Meet the Author

Saeed K. Rahimi, PhD, is an associate professor with the Graduate Program in Software at the University of St. Thomas. He is also a cofounder of DWSoft Corporation and InfoSpan, two companies specializing in metadata  management for data warehousing. He had been a database design and implementation consultant, providing services to the industry and the federal government for over thirty years. He has spoken in many national and international conferences and has published many scientific articles. Dr. Rahimi holds a BS in electrical engineering and a PhD, both in computer science, from the University of Minnesota.

Frank S. Haug is an adjunct professor with the Graduate Programs in Software at the University of St. Thomas, where he has taught graduate courses in software development, distributed database management systems, and data warehousing. He has over twenty-five years of experience in academia and industry, working in areas including software development, database design and implementation, and network administration to implement projects across many technology platforms, DDBMS, and programming languages. Mr. Haug had a BA in mathematics and quantitative methods and computer science, and an MS in software engineering, both from the University of St. Thomas.

Read More Show Less

Table of Contents

Preface.

1 Introduction.

1.1 Database Concepts.

1.2 DBE Architectural Concepts.

1.3 Archetypical DBE Architectures.

1.4 A New Taxonomy.

1.5 An Example DDBE.

1.6 A Reference DDBE Architecture.

1.7 Transaction Management in Distributed Systems.

1.8 Summary.

1.9 Glossary.

References.

References. 

2 Data Distribution Alternatives.

2.1 Design Alternatives.

2.2 Fragmentation.

2.3 Distribution Transparency.

2.4 Impact of Distribution on User Queries.

2.5 A More Complex Example.

2.6 Summary.

2.7 Glossary.

References.

Exercises. 

3 Database Control.

3.1 Authentication.

3.2 Access Rights.

3.3 Semantic Integrity Control.

3.4 Distributed Semantic Integrity Control.

3.5 Cost of Semantic Integrity Enforcement.

3.6 Summary.

3.7 Glossary.

References.

Exercises. 

4 Query Optimization.

4.1 Sample Database.

4.2 Relational Algebra.

4.3 Computing Relational Algebra Operators.

4.4 Query Processing in Centralized Systems.

4.5 Query Processing in Distributed Systems.

4.6 Summary.

4.7 Glossary.

References.

Exercises. 

5 Controlling Concurrency.

5.1 Terminology.

5.2 Multitransaction Processing Systems.

5.3 Centralized DBE Concurrency Control.

5.4 Concurrency Control in Distributed Database Systems.

5.5 Summary.

5.6 Glossary.

References.

Exercises. 

6 Deadlock Handling.

6.1 Deadlock Definition.

6.2 Deadlocks in Centralized Systems.

6.3 Deadlocks in Distributed Systems.

6.4 Summary.

6.5 Glossary.

References.

Exercises. 

7 Replication Control.

7.1 Replication Control Scenarios.

7.2 Replication Control Algorithms.

7.3 Summary.

7.4 Glossary.

References.

Exercises. 

8 Failure and Commit Protocols.

8.1 Terminology.

8.2 Undo/Redo and Database Recovery.

8.3 Transaction States Revisited.

8.4 Database Recovery.

8.5 Other Types of Database Recovery.

8.6 Recovery Based on Redo/Undo Processes.

8.7 The Complete Recovery Algorithm.

8.8 Distributed Commit Protocols.

8.9 Summary.

8.10 Glossary.

References.

Exercises. 

9 DDBE Security (Bradley S. Rubini).

9.1 Cryptography.

9.2 Securing Communications.

9.3 Securing Data.

9.4 Architectural Issues.

9.5 A Typical Deployment.

9.6 Summary.

9.7 Glossary.

References.

Exercises. 

10 Data Modeling Overview.

10.1 Categorizing MLs and DMs.

10.2 The Conceptual Level of the CLP.

10.3 Conceptual Modeling Language Examples.

10.4 Working With Data Models.

10.5 Using Multiple Types of Modeling.

10.6 Summary.

10.7 Glossary.

References.

Exercises. 

11 Logical Data Models.

11.1 The RDM.

11.2 The Network Data Model.

11.3 The Hierarchical Data Model.

11.4 The OODM.

11.5 Summary.

11.6 Glossary.

References.

Exercises. 

12 Traditional DDBE Architectures.

12.1 Applying Our Taxonomy to Traditional DDBE Architectures.

12.2 The MDBS Architecture Classifications.

12.3 Approaches for Developing A DDBE.

12.4 Deployment of DDBE Software.

12.5 Integration Challenges.

12.6 Schema Integration Example.

12.7 Example of Existing Commercial DDBEs.

12.8 The Experiment.

12.9 Summary.

12.10 Glossary.

References.

Exercises. 

13 New DDBE Architectures.

13.1 Cooperative DBEs.

13.2 Peer-to-Peer DDBEs.

13.3 Comparing COOP and P2P.

13.4 Summary.

13.5 Glossary.

References.

Exercises. 

14 DDBE Platform Requirements.

14.1 DDBE Architectural Vocabulary.

14.2 Fundamental Platform Requirements.

14.3 Distributed Process Platform Requirements.

14.4 Distributed Data Platform Requirements.

14.5 Preview of the DDBE Platforms Used in Chapters 15-9.

14.6 Summary.

14.7 Glossary.

References.

Exercises. 

15 The JMS Starter Kit.

15.1 Java Message Service Overview.

15.2 JMS Provider Implementation Alternatives.

15.3 JMS Starter Kit (JMS-SKIT) Framework Overview.

15.4 Using the JMS-SKIT Framework.

15.5 Summary.

15.6 Glossary.

References.

Exercises. 

16 The J2EE Platform.

16.1 Java 2 Enterprise Edition (J2EE) Overview.

16.2 J2EE Support for Distributed Process Platform Requirements.

16.3 J2EE Support for Distributed Data Platform Requirements.

16.4 J2EE Platform Implementation Alternatives.

16.5 Summary.

16.6 Glossary.

References.

Exercises. 

17 The J2EE Starter Kit.

17.1 Java 2 Enterprise Edition Starter Kit (J2EE-SKIT) Overview.

17.2 J2EE-SKIT Design Overview.

17.3 Summary.

17.4 Glossary.

References.

Exercises. 

18 The Microsoft .NET Platform.

18.1 Platform Overview.

18.2 Support for Distributed Process Platform Requirements.

18.3 Distributed Data Platform Requirements.

18.4 Summary.

18.5 Glossary.

References.

Exercises. 

19 The DNET Starter Kit.

19.1 DNET-SKIT Overview.

19.2 DNET-SKIT Design Overview.

19.3 Summary.

19.4 Glossary.

Reference.

Exercises. 

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)