MC - Unit 5 - 31-5-2022 - Final
MC - Unit 5 - 31-5-2022 - Final
MC - Unit 5 - 31-5-2022 - Final
Mobile Computing
Don Bosco College(Co-Ed),
Yelagiri Hills
Data Management issues in Mobile database
Here are some of the issues which arises in data management of the mobile databases:
• 1. Mobile database design –
Because of the frequent shutdown and for handling the queries, the global name resolution
problem is compounded.
• 2. Security –
The data which is left at the fixed location is more secure as compared to mobile data and
hence mobile data is less secure.
• 3. Data distribution and replication –
Uneven distribution of data among the mobile units and the base stations take place here.
Higher data availability and low cost of remote access is there in data distribution and
replication. The problem of Cache management is compounded by the consistency
constraints.
• 4. Replication issues –
There is increase of costs for updates and signalling due to increase in number of replicas.
Mobile hosts can move anywhere and anytime.
• 5. Division of labour –
There is a certain change in the division of labour in query processing because of certain
characteristics of the mobile environment. There are some of the cases in which the client
must function independently of the server.
• 6. Transaction models –
In mobile environment, the issues of correctness of transactions and fault tolerance are
aggravated. All transactions must satisfy the ACID properties, these are atomic, consistency,
isolation, and durability.
Depending upon the movement of the mobile unit, possibly on multiple data sets and through
several base station, a mobile transaction is executed sequentially.
Data Management issues in Mobile database
• 7. Recovery and fault tolerance –
Fault tolerance is the ability of a system to perform its function correctly
even in the presence of internal faults.
• 8. Location based service –
One of the most challenging tasks which must be undertaken is
determining the location of mobile users, which must be undertaken in
order to enable a location based service.
• Issues that arises in location and services are:
– User Privacy
– Diverse mobile mapping standards
– Interoperability
• 9. Query processing –
Query processing is affected when mobility is considered. There is a need
to return a query response to mobile units that may be in transit.
Client Server Computing with Adaptation
· Used for interchange between standard data formats and data formats for
the API
· IBM WebSphere Everyplace Access (WEA) provides adapters for
synchronization objects (for example, XML format synchronization objects) and
the objects of API databases (for example, for the PIM APIs)
Client Server Computing with Adaptation
Database Hoarding Techniques
• Hoarding is the practice of preloading data into the cache in advance of
disconnection in order for the client to continue operating while
unconnected.
• Hoarding is comparable to prefetching, which is used to increase efficiency
in file and database systems.
• Caching, entails saving a copy of selected data or a part of a database from a
connected system with a large database.
• The cached data is hoarded in the mobile device database. Hoarding of the
cached data in the database ensures that even when the device is not
connected to the network, the data required from the database is available
for computing.
• Some examples of hoarding are downloaded ringtones, music etc. which can
be used offline also.
• When the server is connected to the Internet, hoarding occurs. As a result,
the client becomes aggressive and prefetches the data based on the user’s
access pattern. The caching on the other side is not connected to
connectivity, it is an operation that is performed locally on the frequently
used data.
The decision on which files to the cache can be either
(b) taken automatically by the system by utilizing implicit information, which is most
often based on the past history of file references.
Example: A context aware system that provides the data related to meeting as
who was there, when the meeting occurred and where it was located.
Context aware computing
• Context-aware applications
-Context-aware browser (CAB)
-Context-based workplace awareness
-ConaMSN: A context-aware messenger
-InCarMusic: Context-aware music recommendations
-HEP: Context-aware communication service provision
• Security and privacy issues
There are two main security concerns with context-
aware systems.
- Ensuring privacy of location and identity
information.
- Ensuring secure communications.
Transaction Models
• 2. Two-Tier Replication
3. HiCoMo Replication Model Architecture