Comparison of Different Access Strategies in a Distributed Database