Architecture of Highly Available Databases
نویسندگان
چکیده
This paper describes the architectures that can be used to build highly available database management systems. We describe these architectures along two dimensions – process redundancy and data redundancy. Process redundancy refers to the management of redundant processes that can take over in case of a process or node failure. Data redundancy refers to the maintenance of multiple copies of the underlying data. We believe that the process and data redundancy models can be used to characterize most, if not all, highly available database management systems.
منابع مشابه
Providing an Enterprise Architecture Framework Model for Laboratory Information Management Systems by Service Oriented Approach
Background and Aim: Laboratories are one of the most important scientific and research centers. Laboratory information management systems provide a platform for recording the information and collaborating between researchers. The main purpose of this study was suggesting an organizational architecture model of laboratory information management systems. Materials and Methods: This study was a ...
متن کاملDATA MIGRATION ACROSS HETEROGENEOUS NoSQL DATABASES IN A BIG DATA CONTEXT
The recent growing interest on highly-available data-intensive applications sparked the need for flexible and portable storage technologies, e.g., NoSQL databases. NoSQL databases have emerged as the solution to handle large quantities of user-generated content still guaranteeing fault-tolerance, availability and scalability. NoSQL databases offer differentiated properties and characteristics a...
متن کاملFront − End Nodes Back − End Nodes SWITCH
Daniel M. Dias William Kish Rajat Mukherjee and Renu Tewari IBM Research Division T. J. Watson Research Center P.O. Box 704, Yorktown Heights, NY 10598 fdias, c1kish, rajatm, c1renu [email protected] Abstract We describe a prototype scalable and highly available web server, built on an IBM SP-2 system, and analyze its scalability. The system architecture consists of a set of logical front-end or...
متن کاملAggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
متن کاملAn Architecture for Monitoring and Recommending Active Databases DDLs
The integrated monitoring within heterogeneous database environments can become complex, due to the particularities in the language syntax and available tools. In particular, active databases allow developing mechanisms and automation of processes involving data or objects. This work proposes the development of an architecture to identify and monitor DDL, exploring the active databases and reco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004