Skip to main content

Newer Post or latest post

Li-Fi vs Wi-Fi: A Battle of Light and Waves

Li-Fi vs Wi-Fi: A Battle of Light and Waves Li-fi is a light fidelity device that supports only the infrared and other lighting systems to transfer the data to the device which is used to receive from the sender device. Wifi is a wireless fidelity device that supports the radio waves to transfer the data to the wifi device which is used to receive the wifi signals at the limited ranges due to the device version capacity. Introduction to the computer system and computer applications related topics are listed following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves Let’s discuss the computer system related topic and questions above listed and their answers are following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves There are some points on the computer system and data communication related to the topic of “Li-Fi vs Wi-Fi: A Battle of Light and Waves” following below here: Lifi based data communication system:- Li-Fi is a light based signal data transmission ...

What are the disadvantages or drawbacks in the Distributed Database Management System?

What are the disadvantages or drawbacks in the Distributed Database Management System?

Drawbacks or disadvantages of the Distributed Database Management System


  • The distributed database is very costly to manage the data or information from different servers which is connected the database of the sites.
  • It is difficult to develop the database application for software packages.
  • If there are four sites of database application involve in a software packages to their development, one database application of site will damage from any issue then the database will be lose.
  • In the distributed database there are so many bugs when processing the database for database applications.
  • In the algorithm of database processing have so many error for executing the database program.


If the user does not share the distributed database to the other connected server then the will be lost once the currently used server damage by physically harmed from other events.

The distributed database takes a loads to see the information contained the database file and the file is distributed to the another server and connected memory then the file will takes to loads if the user doesn't have high speed of internet service on the computer system. The request can be sent to the user when the user want to see the database file in the Relational Model.



Can a distributed database provide higher security than a centralized database model?


Infographic comparing centralized and distributed database security. Left side shows a centralized database connected to multiple computers, with a shield symbol on the main server. Right side shows a decentralized database model with multiple database icons, each secured with a padlock, connected by dotted lines. Title at the top reads: 'Can a distributed database provide higher security than a centralized database model ?


The clear answer on this concept is no but not truly negative because The centralized database model provides the highest security system to protect the database which includes the sensitive information and database.

Privileged Users only can access the centralized database model to manipulate and use the database.

The distributed database management system provides the end to end encryption method to protect the data which is very effective but not more than secure from a centralized database management system.

Where the distributed database management system provides the data replication which means the data can be duplicated on the multiple nodes or the multiple servers to provide the copy of the same data and information to access it when the user wants to access the data which is used to recover from different server nodes.

If the distributed system has a single point of data traffic is detected in higher from the third party user or attackers then they can attack on the nodes to get access the most of the data transmission performed in the distributed network which gives other nodes address to access it to steal the information and corrupt 40% of distributed database management system.

There is another reason that the will be protected because the distributed system has multiple nodes to get the recover the old data from distributed server from their storage device and in this process it can take some time to find out the specific file or information due to heavy database loads and data traffic occurring in the distributed system to find the file or information using query applied through software.

Most of the distributed systems uses the storage area network for store the database files which are used to process efficiently in the distributed systems to provide the higher processing system on the database file and information to retrieve it for the user where the user access the data from the website and the website is connected to the distributed servers and the distributed servers are connected to the storage area network model.

The distributed database management system is a complex model that cannot be considered for applying higher security but there is cryptography language that is mostly used in the distributed system for data transmission process and protection from the third access.

Such as:- a blockchain technology uses an end to end encryption of data transmission to share the message to each other where the user can share and send to the particular user or a group in the message application software to provide the end to end encryption method. In this method the sent message the ciphertext is generated from the message application software for chatting to send to the application where the another user has a different account then the user can easily share the without any encoded data, the user just send the simple hi or hello language message and easily decoded from the different user has on the same message application software to show the correct message.


-----------------------------------------------------------------------------------------------------------------------------


I hope you from this topic “What are the disadvantages or drawbacks in the Distributed Database Management System? ” and you can enjoy this informative post that i have published and provide you to the information technology or computer science related solution or questions/answers provided in the topic to study and happy learning 🙂

"Thank you for taking the time to read this post! I hope you found the information helpful and informative. Don't forget to stay tuned for more exciting updates and insightful content. Your support means the world to me!"


My latest post is here links below about the databases technology

What are the components of data model in [DBMS] Relational Database Management System?

There are five main components of data model... 👉 click here ðŸ‘ˆ

What is stability of the distributed database management system?

In the distributed database model there are.... 👉 click here👈

Comments

Popular posts from this blog

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

Types of Local Storage in Computer Systems

Describe the different types of local storage of computer systems? The local storage device is a type of memory for the user to keep a database file for a long time to access again and stored as a distributed offline database on the local storage. The local storage device can be pendrive, compact discs, dvd, floppy drive, HDD, SSD, memory card etc. The local storage needs to keep the valuable database file for the user to provide the lost database if suddenly deleted or formatted the whole drive of the computer system. Local storage in computer systems refers to devices or media that store data directly connected to the computer. There are several types, including Hard Disk Drives (HDDs), which use spinning disks and magnetic heads to store data; Solid-State Drives (SSDs), which store data in flash memory, offering faster access times and lower power consumption; and Hybrid drives, which combine elements of both. Other forms of local storage include USB flash drives, SD cards, and CDs/...

Discuss the data replication on the distributed database system?

Discuss the data replication on the distributed database system? The data replica is a term that refers to the data replication means the copy of data into the servers distributed to access the copy of data. The data replication in a distributed database system is a term that provides the benefits for the user to easily access the data from the nearby server provided for the client user from the website. The data can be easily accessible from the server and provide the fast speed with reduces the latency of the data transfer to the client server such as:- if the user access the data from their smartphone device then the data will be fast to load because the nearby server provide the data replicated or copied of data to the user. Data replication in a distributed database system involves creating and maintaining multiple copies of data across different nodes or locations to enhance availability, reliability, and performance. It ensures that users can access data even if a node fails, re...