Disadvantages And Cons And Disadvantages Of Mongodb?

Decent Essays
Submitted By
Ejaz Urval - 667116837
Jobert Correia - 668724826
Niharika Dhawad - 661340878
Rutuja Desai - 669292858

Table of Contents
Introduction to MongoDB 3
Features of MongoDB 3
Drawbacks of MongoDB 4
SQL vs MongoDB 4
Sharding and Replication 5
Implementation 6
Retrieval of live tweets 7
Conclusions 9
References Error! Bookmark not defined.

Introduction to MongoDB
The traditional relational database proved to be insufficient when it came to store unstructured large amount of data by companies like Facebook, Google, Amazon.com. Such databases which were used for storage and retrieval of this unstructured data existed since late 1960s but they gained popularity
…show more content…
It allows developers to focus on programming, rather than scaling, since the design already includes automated scaling and management of hardware and software infrastructure. MongoDB is completely based on concept of collection of documents which are nothing but key-value pairs. It supports APIs in various computer languages like JavaScript, Python, Ruby, Java, C++, Perl.
Features of MongoDB MongoDB has the following features which are apt for NoSQL databases and that is why is most widely used for NoSQL database management. Schema-less: This is the major reason why companies went for NoSQL as it is schema-less and thus can store unstructured data efficiently. The data can be stored in any structure and few key-value pairs may be empty or have different data types all in same document. Thus, a document with integer type id can have another key-value pair with char data type. This makes the NoSQL database easier to update, delete and make the required changes to the data. Sharding and Replication: This allows MongoDB to store and balance load of data across multiple servers called shards and replicate them to prevent loss of
…show more content…
Shard(S): Shards are the divided servers which store the data( S_11……...〖 S〗_42 ) Config servers (C): Each sharded cluster must have its own config server. These servers keep information of the location of data on the shards.
Replication (2): It is the process of loading the same data across multiple servers. This is done to increase data availability and avoid loss of data. In MongoDB, replica sets are used for this. The replica sets host the same data for replication purpose. Two types of nodes are present here- Master(primary) node and Slave(secondary) node. The master node receives all the write operations while read operations can be performed from both, the master and slave nodes.
Implementation
MongoDB has a paid cloud based service called Atlas (about 50 cents an hour). The entire project was done on one system. The implementation of sharding was on different partitions of the same system as it was difficult to sync servers on 32 and 64 bit systems between different operating systems. The entire project was carried out on the Eclipse IDE and written in Java. The Twitter4J library and MongoDB Java driver were

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 7 Exercise 1

    • 756 Words
    • 4 Pages

    6 8. The following parameters are calculated for each of the node in each of the server wings: Voltage, Temperature, Fan Speed, CPU Utilization. After we calculate the theoretical values of the parameters we calculate the threshold value using the above, if the calculated value exceeds the threshold value there is a chances of the node to fail, and hence we take the previously mentioned migration policies to tackle the situation.…

    • 756 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    repository or central database and trusted third party Central authority(CA) are used to revoke, issue and store the keys. There is always a risk that these centralized infrastructure can be violated. Hence, Blochcain can be use to to reduce the risks of storing PKI on centralized infrastructure. Here the Data(Keys) will be distributed across the blochchain network[3] In the 2nd section we will go through the introduction of blockchain,…

    • 625 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    If the data is not stored appropriately, then the information that is repetitive in nature will be processed again and again. This will result in high processing time of data that could have been stored for future use. Thus, a robust infrastructure is needed that will be able to not only store high volumes of data but also be able process that data in very quick time frame. The large amount of data generated by the IoT devices also brings about the issue of security.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To represent the constraints on the host level (and implicitly on the level of feature packs), and uses a dependency matrix. Figure represents an example of a dependency matrix that shows the dependencies between the different hosts, as well as restrictions on these dependencies. The first column and the first row represent a file (database). Each cell contains a set of pairs (C, H), where C indicates the constraint and H indicates the type of dependency. A value of 2 means a strong dependency and 1 indicating a weak dependency.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Pt2520 Week 2 Assignment

    • 517 Words
    • 3 Pages

    This week we learned lots about the decomposition of our relations we are creating in the database as well how to make the relations into normal forms, which there are three normal forms. I learned that there can be data that is redundant and therefore not useful for the database. This data has no integrity and can be misplaced and even confuse how the data can be used and retrieved. This type of problem must be avoided. I had a hard time understanding how the breaking down of one relation into two or more would help keep all the data from being redundant.…

    • 517 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Xacc/280 Week 6 Checkpoint

    • 1099 Words
    • 5 Pages

    The organization had total three possible solutions for the problems they were facing. The first solution was Google drive which is considered as a good alternative in place for an enterprise program. The second solution is WordPress which has blogs, websites and online publications and also has an easy-to-use content management system which allows from drafting articles to scheduling of posts. The third solution which the organization finally adopted to solve the problems was the SharePoint. Google drive is a good solution for smaller businesses.…

    • 1099 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Case Study Assignment – I Campbellsville University MASSIVE DATABASE MASTERING - MASTERCARD INTERNATIONAL Various affiliations are endeavoring to address the open entryways and limit challenges related with "huge data." Industry masters gage that the total volume of data is increasing at general interims and most by a wide margin of new data being delivered is prepared to go spaces. MasterCard Universal (www.mastercard.com) is not any more impossible to miss to think about the issues identified with monstrous databases. MasterCard has amassed a data circulation focus that is more than 100-terabytes in size. Insiders expect that it will create to more than 1.8 petabytes.…

    • 933 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Marcella Gundlach 09/25/2016 Persuasive speech outline Thesis: Steve Jobs is more than a cultural icon. He has improved the lives of others by making important contributions to society. Such as simplifying technology, saving the environment, and by making Apple’s products more efficient for its users. Attention Getter:…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Chapter 9

    • 1156 Words
    • 5 Pages

    Submit the questions as a Word document attachment. Chapter 9 Project Questions: 56, 59, & 60. Ensure you include a link to the websites and APA information. Chapter 9 Review Questions: 1, 2, 4, 7 - 9, 11 - 19, 30, 31, 36, 38 - 45, 51, & 54. Chapter 10B Review Questions: 8 - 11.…

    • 1156 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Name Muhammad Shahzad (73537) Who are Agero constituents? Broadly speaking Agero has four different types of constituents which are mentioned below • Drivers • Service provider • OEM • Insurance Companies…

    • 1277 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    SWOT ANALYSIS The SWOT analysis is an analytical tool used to identify the internal strengths, weaknesses as well as external opportunities and threats of the Airbnb company. Table below shows the SWOT analysis for Airbnb company: STRENGTHS WEAKNESSES  An excellent customer-centric service operation 24/7.  Well recognized brand and a trendy public image.  Large number of users: 20 million in database and still growing from time to time.…

    • 305 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Amazon Research Paper

    • 1604 Words
    • 7 Pages

    Has big data improved amazon as a company Introduction This research paper will focus on answering the question “ Has big data improved amazon as a company?” The objectives of this assignment is to examine why the timeline of amazon is relevant to big data. An additional objective is to explore whether amazon have met the needs of its customers through e-commerce and whether the technology in place can be deemed beneficial to the company. An additional objective is to determine if any ethical or security issues are involved.…

    • 1604 Words
    • 7 Pages
    Superior Essays

Related Topics