rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780849328008

Grid Database Design

by ;
  • ISBN13:

    9780849328008

  • ISBN10:

    0849328004

  • Format: Hardcover
  • Copyright: 2005-05-26
  • Publisher: Auerbach Public

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $135.00 Save up to $88.80
  • Rent Book $96.19
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Grid Database Design [ISBN: 9780849328008] for the semester, quarter, and short term or search our site for other textbooks by Wells; April J.. Renting a textbook can save you up to 90% from the cost of buying.

Summary

Grid Database Design investigates the origin, background, and components of this new computing model. It presents new concepts and analyzes pre-existing ideas in the context of Grid, educating organizations as to how Grid can increase computing power and strengthen operations. Divided into three sections, the volume begins by laying the groundwork, defining the concepts that led to the model's emergence. The second section explains what is entailed in building a Grid, focusing on security, hardware, and the forces driving growth. The final section explores details of databases in a Grid environment, illustrating how the Grid environment will shape database evolution.

Table of Contents

SECTION I: IN THE BEGINNING
History
3(32)
Computing
3(1)
Early Mechanical Devices
3(8)
Computing Machines
11(6)
The 1960s
17(5)
The 1970s
22(4)
The 1980s
26(4)
The 1990s
30(3)
The 21st Century
33(2)
Definition and Components
35(24)
P2P
37(3)
Napster
38(1)
Gnutella
38(2)
Types
40(16)
Computational Grid
40(1)
Distributed Servers and Computation Sites
41(1)
Remote Instrumentation
41(1)
Data Archives
42(1)
Networks
43(1)
Portal (User Interface)
43(1)
Security
44(1)
Broker
45(1)
User Profile
45(1)
Searching for Resources
46(1)
Batch Job Submittal
46(2)
Credential Repository
48(1)
Scheduler
48(1)
Data Management
49(1)
Data Grid
50(1)
Storage Mechanism Neutrality
51(1)
Policy Neutrality
51(1)
Compatibility with Other Grid Infrastructure
51(1)
Storage Systems
51(1)
Access or Collaboration Grid
52(1)
Large-Format Displays
52(1)
Presentation Environments
53(1)
Interfaces to Grid Middleware
53(1)
Others
54(1)
Scavenging Grid
54(2)
Grid Scope
56(3)
Project Grid, Departmental Grid, or Cluster Grid
56(2)
Enterprise Grid or Campus Grid
58(1)
Global Grid
58(1)
Early Adopters
59(24)
Computational and Experimental Scientists
59(1)
Bioinformatics
60(1)
Corporations
60(1)
Academia
60(2)
University of Houston
61(1)
University of Ulm Germany
61(1)
The White Rose University Consortium
62(1)
Science
62(1)
Particle Physics
62(1)
Industries
63(12)
Gaming
63(2)
Financial
65(1)
Wachovia
66(1)
RBC Insurance
66(1)
Charles Schwab
66(1)
Life Science
67(1)
The American Diabetes Association
67(2)
North Carolina Genomics and Bioinformatics Consortium
69(1)
Spain's Institute of Cancer Research
69(1)
Petroleum
69(1)
Royal Dutch Shell
69(1)
Utilities
70(1)
Kansai Electric Power Co., Inc.
70(1)
Manufacturing
70(1)
Ford Motor Company
70(1)
Saab Automobile
71(1)
Motorola
71(1)
Government
71(1)
NASA
72(1)
U.S. Department of Defense
72(1)
European Union
73(1)
Flemish Government
74(1)
Benefits
75(8)
Virtualization
75(8)
SECTION II: THE PARTS AND PIECES
Security
83(50)
Security
83(38)
Authentication
84(1)
Reciprocity of Identification
85(1)
Computational Efficiency
85(1)
Communication Efficiency
86(1)
Third-Party Real-Time Involvement
86(1)
Nature of Security
86(1)
Secret Storage
87(1)
Passwords
87(1)
Private Key
88(1)
Block Ciphers
89(1)
Stream Ciphers
89(2)
Public Key
91(5)
Digital Signature
96(5)
Authorization
101(1)
Delegation of Identity
102(1)
Delegation of Authority
103(1)
Accounting
103(1)
Audit
103(1)
Access Control
104(1)
DAC
104(1)
MAC
105(1)
Allow and Deny
106(1)
Satisfy
107(1)
Role-Based Access
107(1)
Usage Control
108(1)
Cryptography
108(1)
Block Cipher
109(1)
Stream Ciphers
110(1)
Linear Feedback Shift Register
110(1)
One-Time Pad
111(1)
Shift Register Cascades
111(1)
Shrinking Generators
112(1)
Accountability
112(3)
Data Integrity
115(1)
Attenuation
116(1)
Impulse Noise
116(1)
Cross Talk
116(1)
Jitter
117(1)
Delay Distortion
117(1)
Capability Resource Management
118(3)
Database Security
121(12)
Inference
121(3)
Server Security
124(1)
Database Connections
125(1)
Table Access Control
125(5)
Restricting Database Access
130(1)
DBMS Specific
131(2)
The Hardware
133(14)
Computers
133(7)
Blade Servers
138(2)
Storage
140(3)
I/O Subsystems
143(1)
Underlying Network
143(1)
Operating Systems
144(1)
Visualization Environments
144(1)
People
145(2)
Metadata
147(24)
Grid Metadata
152(1)
Data Metadata
153(1)
Physical Metadata
154(1)
Domain-Independent Metadata
154(1)
Content-Dependent Metadata
154(1)
Content-Independent Metadata
155(1)
Domain-Specific Metadata
155(1)
Ontology
155(1)
User Metadata
155(1)
Application Metadata
156(1)
External Metadata
156(1)
Logical Metadata
157(1)
User
157(1)
Data
158(1)
Resources
158(1)
Metadata Services
158(1)
Context
158(1)
Structure
158(1)
Define the Data Granularity
159(1)
Database
159(1)
Access
159(1)
Metadata Formatting
160(9)
XML
161(1)
What Is XML?
161(7)
Application
168(1)
MCAT
169(1)
Conclusion
170(1)
Drivers
171(24)
Business
174(9)
Accelerated Time to Results
174(1)
Operational Flexibility
174(1)
Leverage Existing Capital Investments
175(1)
Better Resource Utilization
176(1)
Enhanced Productivity
176(2)
Better Collaboration
178(1)
Scalability
178(1)
ROI
179(1)
Reallocation of Resources
180(1)
TCO
181(2)
Technology
183(12)
Infrastructure Optimization
183(1)
Increase Access to Data and Collaboration
183(1)
Resilient, Highly Available Infrastructure
183(1)
Make Most Efficient Use of Resources
184(1)
Services Oriented
185(1)
Batch Oriented
186(1)
Object Oriented
186(1)
Supply and Demand
186(1)
Open Standards
187(1)
Corporate IT Spending Budgets
187(1)
Cost, Complexity, and Opportunity
188(2)
Better, Stronger, Faster
190(1)
Efficiency Initiatives
191(4)
SECTION III: DATABASES IN THE GRID
Introducing Databases
195(18)
Databases
195(1)
Relational Database
196(6)
Tuples
197(1)
Attributes
198(1)
Entities
198(1)
Relationship
198(1)
Relational Algebra
198(1)
Union
198(1)
Intersection
198(1)
Difference
199(1)
Cartesian Product
199(1)
Select
199(1)
Project
200(1)
Join
200(1)
Relational Calculus
200(2)
Object Database
202(1)
Architecture Differences between Relational and Object Databases
203(1)
Object Relational Database
203(2)
SQL
205(4)
Select
206(1)
Where
206(1)
And/Or
206(1)
In
207(1)
Between
207(1)
Like
207(1)
Insert
207(1)
Update
208(1)
Delete
208(1)
Database
209(1)
Data Model
209(1)
Schema
209(1)
Relational Model
209(1)
Anomalies
209(4)
Insert Anomaly
210(1)
Deletion Anomaly
210(1)
Update Anomaly
210(3)
Parallel Database
213(28)
Data Independence
213(1)
Parallel Databases
214(4)
Start-Up
216(1)
Interference
216(1)
Skew
217(1)
Attribute Data Skew
217(1)
Tuple Placement Skew
217(1)
Selectivity Skew
217(1)
Redistribution Skew
217(1)
Join Product Skew
218(1)
Multiprocessor Architecture Alternatives
218(4)
Shared Everything
218(1)
Shared Disk
219(1)
Shared Nothing (Message Passing)
220(1)
Hybrid Architecture
221(1)
Hierarchical Cluster
221(1)
NUMA
222(1)
Disadvantages of Parallelism
222(2)
Database Parallelization Techniques
224(4)
Data Placement
224(1)
Parallel Data Processing
224(1)
Parallel Query Optimization
224(1)
Transaction Management
224(1)
Parallelism Versus Fragmentation
224(1)
Round-Robin
225(1)
Hash Partitioning
225(1)
Range Partitioning
225(1)
Horizontal Data Partitioning
226(1)
Replicated Data Partitioning
226(1)
Chained Partitioning
227(1)
Placement Directory
227(1)
Index Partitioning
228(1)
Partitioning Data
228(1)
Data-Based Parallelism
228(3)
Interoperation
228(1)
Intraoperation
229(1)
Pipeline Parallelism
229(1)
Partitioned Parallelism
230(1)
Parallel Data Flow Approach
231(2)
Retrieval
232(1)
Point Query
232(1)
Range Query
232(1)
Inverse Range Query
232(1)
Parallelizing Relational Operators
233(4)
Operator Replication
233(1)
Merge Operators
233(1)
Parallel Sorting
233(1)
Parallel Aggregation
234(1)
Parallel Joins
234(3)
Data Skew
237(4)
Load Balancing Algorithm
237(1)
Dynamic Load Balancing
238(3)
Distributing Databases
241(20)
Advantages
245(1)
Disadvantages
245(1)
Rules for Distributed Databases
246(2)
Fragmentation
248(7)
Completeness
249(1)
Reconstruction
249(1)
Disjointedness
249(1)
Transparency
249(1)
Distribution Transparency
250(1)
Fragmentation Transparency
250(1)
Location Transparency
250(1)
Replication Transparency
250(1)
Local Mapping Transparency
251(1)
Naming Transparency
251(1)
Transaction Transparency
251(1)
Performance Transparency
252(1)
Vertical Fragmentation
252(2)
Horizontal Fragmentation
254(1)
Hybrid
255(1)
Replication
255(1)
Metadata
256(1)
Distributed Database Failures
257(1)
Failure of a Site
257(1)
Loss of Messages
257(1)
Failure of a Communication Link
257(1)
Network Partition
257(1)
Data Access
258(3)
Data Synchronization
261(14)
Concurrency Control
262(5)
Distributed Deadlock
262(2)
Database Deadlocks
264(1)
Multiple-Copy Consistency
265(1)
Pessimistic Concurrency Control
266(1)
Two-Phase Commit Protocol
267(1)
Time Stamp Ordering
267(5)
Optimistic Concurrency Control
268(2)
Heterogeneous Concurrency Control
270(1)
Distributed Serializability
271(1)
Query Processing
271(1)
Query Transformations
271(1)
Transaction Processing
271(1)
Heterogeneity
272(3)
Conclusion
275(2)
Index 277

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program