SlideShare a Scribd company logo
1 of 33
ADBMS
By:
Dabbal S. Mahara
2018 1
Introduction
 Recent advances in portable and wireless technology have led
to mobile computing, a new dimension in data communication
and processing.
 Portable computing devices coupled with wireless
communications allow clients to access data from virtually
anywhere and at any time.
 The mobile computing platform allows users to establish
communication with other users and to manage their work while
they are mobile.
 This feature is especially useful to geographically dispersed
organizations.
2
Introduction
 What is mobile computing?
• Users with portable computers still have network
connections while they move.
• Mobile Computing is an umbrella term used to
describe technologies that enable people to
access network services anyplace, anytime, and
anywhere.
3
4
Fully connected information space
5
Fully connected information space
 Each node of the information space has some
communication capability.
 Some node can process information.
 Some node can communicate through voice channel.
 Some node can do both
 Can be created and maintained by integrating legacy
database systems, and wired and wireless systems.
Problems in Mobile Computing
 There are a number of hardware and software problems that
must be resolved before the capabilities of mobile computing
can be fully utilized
 Some of the software problems – which may involve data
management, transaction management, and database recovery
– have their origins in distributed database systems
 In mobile computing, the problems are more difficult, mainly
because of:
 The limited and intermittent connectivity afforded by wireless
communications
 The limited life of the power supply(battery)
 The changing topology of the network
 In addition, mobile computing introduces new architectural possibilities
and challenges 6
7
Mobile Objects
• A mobile object is some code that
carries a state
• Lives in a host
• That visits places
• which is let in when trusted
• and barred when untrusted
• and will refuse to go to
untrustworthy places
Mobile Database
 A mobile database is a database that can be connected
to by a mobile computing device over a wireless mobile
network.
 Mobile databases:
• Physically separate from the central database server.
• Resided on mobile devices.
• Capable of communicating with a central database server or
other mobile clients from remote sites.
• Handle local queries without connectivity. 8
Why Mobile Databases?
 Mobile data-driven applications enable us to access any
data from anywhere, anytime.
 Examples:
• Salespersons can update sales records on the move.
• Reporters can update news database anytime.
• Doctors can retrieve patient’s medical history from
anywhere.
 Mobile DBMSs are needed to support these applications
data processing capabilities. 9
Mobile Computing Architecture
 The general architecture of a mobile platform is a distributed
architecture where a number of computers, generally referred to
as Fixed Hosts and Base Stations, are interconnected through a
high speed wired network
 Fixed hosts are general purpose computers that are not typically
equipped to manage mobile units but can be configured to do so
 Base stations function as a gateways to the fixed network for the
Mobile Units; They are equipped with wireless interfaces and
offer network access services of which mobile units are clients
10
Mobile Computing Architecture
Fig: A general architecture of a mobile platform
11
Base Station (BS):
 A network element that interconnects the mobile station
(or Mobile unit (MU)) to the network via the air interface.
 Each cell in the network has a BS associated with it.
 The primary function of a BS is to maintain the air
interface, or medium, for communication to any mobile
unit within its cell.
 Other functions of BS are call processing, signaling,
maintenance, and diagnostics.
12
Mobile Computing Architecture
Mobile Units (MU)
 Also called Mobile Systems (MS) or Mobile Hosts (MH).
 Mobile units are battery-powered portable computers that move freely in a
geographic mobility domain, an area that is restricted by the limited bandwidth
of wireless communication channels.
 It consists of three components: (a) transceiver, (b) antenna, and (c) user
interface.
 The user interface exists only at MU, which consists of a display, a keypad for
entering information, and an audio interface for speaking and hearing voice
conversation. This can be a laptop, a palmtop, or a cell phone, or any other
mobile device.
 A downlink channel is used for sending data from a BS to an MU and an
uplink channel is used for sending data from an MU to its BS.
13
Mobile Computing Architecture
Mobile Computing Architecture
 Wireless Communications:
• The wireless medium on which mobile units and base stations
communicate have bandwidths significantly lower than those of a
wired network
• Some wireless access options allow seamless roaming throughout
a geographical region (e.g., cellular networks), whereas WiFi
networks are localized around a base station;
• Some wireless networks, such as WiFi and Bluetooth, use
unlicensed areas of frequency spectrum, which may cause
interference with other appliances, such as cordless telephones;
• Modern wireless networks can transfer data in units called packets,
that are commonly used in wired networks in order to conserve
bandwidth;
• Wireless applications must consider these characteristics when
choosing a communication option
14
Mobile Computing Architecture
 Client/Network Relationships:
• Mobile units can move freely in a geographic mobility domain, an
area that is circumscribed by wireless network coverage;
• To manage the mobility of units, the entire geographic mobility
domain is divided into one or more smaller domains, called cells,
each of which is supported by at least one base station;
• The mobile discipline requires that the movement of mobile units
be unrestricted throughout the cells of a geographic mobility
domain, while maintaining information access contiguity – i.e.
intercell movement, does not negatively affect the data retrieval
process;
15
Mobile Computing Architecture
 The mobile computing platform can be effectively described under the
client-server paradigm, which means we may sometimes refer to a
mobile unit as a client or sometimes as a user, and the base stations
as servers.
 Each cell is managed by a base station, which contains transmitters
and receivers for responding to the information-processing needs of
clients located in the cell.
 We assume that the average query response time is much shorter than
the time required by the client to physically traverse a cell.
 Clients and servers communicate through wireless channels.
16
Client/Network Relationships:
17
18
Mobile Computing Architecture
 Wireless communications for mobile ad-hoc network (MANET) is
different; In a MANNET, co-located mobile units do not need to
communicate via a fixed network, but instead, from their own using cost-
effective technologies such as Bluetooth;
 In a MANNET, mobile units are responsible for routing their own data,
effectively acting as base stations as well as clients; They must be
robust enough to handle changes in the network topology, such as the
arrival or departure of other mobile units
 MANNET applications can be considered as peer-to-peer, meaning that
a mobile unit is simultaneously a client and a server;
 Transaction processing and data consistency control become more
difficult since there is no central control;
 Resource discovery and data routing by mobile units make computing
even more complicated 19
Characteristics of Mobile Environments
 The characteristics of mobile computing include high
communication latency, intermittent wireless connectivity,
limited battery life, and changing client location
 Latency is caused by the processes unique to the wireless
medium, such as coding data for wireless transfer, and tracking
and filtering wireless signals at the receiver
 Intermittent connectivity can be intentional or unintentional;
unintentional disconnections happen in areas where wireless
signals cannot reach, e.g., elevator shafts or subway tunnels;
Intentional disconnections occur by user intent, e.g., during an
airplane takeoff, or when the mobile device is powered down
20
 Battery life is directly related to battery size, and indirectly related
to the mobile device’s capabilities
 Client locations are expected to change, which alters the network
topology and may cause their data requirements to change
 All these characteristics impact data management, and robust
mobile applications must consider them
 To compensate for high latencies and unreliable connectivity,
clients cache replicas of important, frequently accessed data, and
work offline, if necessary; Besides increasing data availability and
response time, caching can also reduce client power consumption
by eliminating the need to make energy-consuming wireless data
transmission for each data access
21
Characteristics of Mobile Environments
 The server may not be able to reach a client; A client may be
unreachable because it is dozing – in an energy-conserving state
in which many subsystems are shut down – or because it is out of
range of a base station; In either case, neither client nor server
can reach the other, and modifications must be made to the
architecture in order to compensate for this case;
 Proxies for unreachable components are added to the
architecture; For a client (and symmetrically for a server), the
proxy can cache updates intended for the server; When a
connection becomes available, the proxy automatically forwards
these cached updates to their ultimate destination
22
Characteristics of Mobile Environments
 Mobile computing poses challenges for servers as well as clients;
 The latency involved in wireless communication makes scalability a
problem; Since latency due to wireless communications increases
the time to service each client request, the server can handle fewer
clients;
 One way servers relieve this problem is by broadcasting data
whenever possible; A server can simply broadcast data periodically;
Broadcast also reduces the load on the server, as clients do not have
to maintain active connections to it
23
Characteristics of Mobile Environments
Characteristics of Mobile Environments
 Client mobility also poses many data management challenges;
Servers must keep track of client locations in order to efficiently
route messages to them;
 Client data should be stored in the network location that minimizes
the traffic necessary to access it.;
 The act of moving between cells must be transparent to the client;
 The server must be able to gracefully divert the shipment of data
from one base to another, without the client noticing; Client mobility
also allows new applications that are location-based
24
Types of Data in Mobile Application
 Mobile applications can be categorized in two ways: (1) vertical
applications and (2) horizontal applications.
 In vertical applications users access data within a specific cell, and
access is denied to users outside of that cell. For example, users can
obtain information on the location of doctors or emergency centers
within a cell or parking availability data at an airport cell.
 In horizontal applications, users cooperate on accomplishing a task, and
they can handle data distributed throughout the system. The horizontal
application market is massive; two types of applications most
mentioned are mail-enabled applications and information services to
mobile users.
25
 Data may be classified into three categories:
1. Private data: A single user owns this data and manages it. No other user
may access it.
2. Public data: This data can be used by anyone who can read it. Only one
source updates it. Examples include weather bulletins or stock prices.
3. Shared data: This data is accessed both in read and write modes by
groups of users. Examples include inventory data for products in a
company.
 Public data is primarily managed by vertical applications, while shared
data is used by horizontal applications, possibly with some replication.
Copies of shared data may be stored both in base and mobile stations.
26Types of Data in Mobile Application
Data Management Issues
 From a data management standpoint, mobile computing may be
considered a variation of distributed computing
 Mobile databases can be distributed under two possible scenarios:
1. The entire database is distributed mainly among the wired
components, possibly with full or partial replication; A base station or
fixed host manages its own database with a DBMS-like functionality,
with additional functionality for locating mobile units and additional
query and transaction management features to meet the
requirements of mobile environments
2. The database is distributed among wired and wireless components;
Data management responsibility is shared among base stations or
fixed hosts and mobile units
27
Data Management Issues
 The distributed data management issues can also be applied to
mobile databases with the following additional considerations and
variations:
• Data distribution and replication – Data is unevenly distributed
among the base stations and mobile units
• Transactions models – Issues of fault tolerance and correctness
of transactions are aggravated
• Query processing – Awareness of where data is located is
important and affects the cost/benefit analysis of query
processing; Query optimization is more complicated because of
mobility and rapid resource changes of mobile units
• Recovery and fault tolerance – The mobile database environment
must deal with site, media, transaction, and communication
failure
28
Data Management Issues
 Mobile database design – The global name resolution
problem for handling queries is compounded because of
mobility and frequent shutdown
 Location-based service – As clients move, location-dependent
cache information may become stale
 Division of labor – Certain characteristics of the mobile
environment force a change in the division of labor in query
processing
 Security – Mobile data is less secure than that which is left at
the fixed location
29
30
Applications of Mobile Computing
• For Estate Agents
• In courts
• In companies
• Stock Information Collection/Control
• Credit Card Verification
• Taxi/Truck Dispatch
• Electronic Mail/Paging
Challenges
 Disconnection
 Low bandwidth
 High bandwidth variability
 Low power and resources
 Security risks
 Wide variety terminals and devices with different capabilities
 Device attributes
 Fit more functionality into single, smaller device
31
32
Thank You !
33

More Related Content

What's hot

Query processing in Distributed Database System
Query processing in Distributed Database SystemQuery processing in Distributed Database System
Query processing in Distributed Database SystemMeghaj Mallick
 
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMSkoolkampus
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency ControlDilum Bandara
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems Haitham Ahmed
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computinggaurav jain
 
Overview of Concurrency Control & Recovery in Distributed Databases
Overview of Concurrency Control & Recovery in Distributed DatabasesOverview of Concurrency Control & Recovery in Distributed Databases
Overview of Concurrency Control & Recovery in Distributed DatabasesMeghaj Mallick
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architecturesPooja Dixit
 
Emerging DB Technologies
Emerging DB TechnologiesEmerging DB Technologies
Emerging DB TechnologiesTalal Alsubaie
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMSkoolkampus
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 ReliabilityAli Usman
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 

What's hot (20)

Query processing in Distributed Database System
Query processing in Distributed Database SystemQuery processing in Distributed Database System
Query processing in Distributed Database System
 
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMS
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
 
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query ProcessingDistributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
 
Deductive databases
Deductive databasesDeductive databases
Deductive databases
 
Vm migration techniques
Vm migration techniquesVm migration techniques
Vm migration techniques
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Overview of Concurrency Control & Recovery in Distributed Databases
Overview of Concurrency Control & Recovery in Distributed DatabasesOverview of Concurrency Control & Recovery in Distributed Databases
Overview of Concurrency Control & Recovery in Distributed Databases
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Emerging DB Technologies
Emerging DB TechnologiesEmerging DB Technologies
Emerging DB Technologies
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS
 
Xml databases
Xml databasesXml databases
Xml databases
 
Temporal databases
Temporal databasesTemporal databases
Temporal databases
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
 
Object oriented databases
Object oriented databasesObject oriented databases
Object oriented databases
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Ddbms1
Ddbms1Ddbms1
Ddbms1
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 

Similar to Mobile databases

Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting ines beltaief
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computingVENNILAV6
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...IOSR Journals
 
M.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxM.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxMeymunaMohammed1
 
Mobile computing
Mobile computingMobile computing
Mobile computingSaranyaK68
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKAashish Pande
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniquesijcsa
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...
A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...
A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...Sara Alvarez
 
Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
 
Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteAviat Networks
 
Mobile Database ,alrazgi
Mobile Database ,alrazgiMobile Database ,alrazgi
Mobile Database ,alrazgialrazgi
 

Similar to Mobile databases (20)

Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
M.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxM.Sc Mobile computing.pptx
M.Sc Mobile computing.pptx
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniques
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...
A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...
A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
unit-1 notes
unit-1 notesunit-1 notes
unit-1 notes
 
Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connected
 
Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell Site
 
Mobile Database ,alrazgi
Mobile Database ,alrazgiMobile Database ,alrazgi
Mobile Database ,alrazgi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 

More from Dabbal Singh Mahara (18)

Spatial databases
Spatial databasesSpatial databases
Spatial databases
 
Ordbms
OrdbmsOrdbms
Ordbms
 
Odbms concepts
Odbms conceptsOdbms concepts
Odbms concepts
 
Object database standards, languages and design
Object database standards, languages and designObject database standards, languages and design
Object database standards, languages and design
 
Normalization
NormalizationNormalization
Normalization
 
Active database
Active databaseActive database
Active database
 
Relational model
Relational modelRelational model
Relational model
 
Overview of dbms
Overview of dbmsOverview of dbms
Overview of dbms
 
ER modeling
ER modelingER modeling
ER modeling
 
EER modeling
EER modelingEER modeling
EER modeling
 
Unit 9 graph
Unit   9 graphUnit   9 graph
Unit 9 graph
 
Unit 7 sorting
Unit   7 sortingUnit   7 sorting
Unit 7 sorting
 
Unit 6 tree
Unit   6 treeUnit   6 tree
Unit 6 tree
 
Unit 5 linked list
Unit   5 linked listUnit   5 linked list
Unit 5 linked list
 
Unit 4 queue
Unit   4 queueUnit   4 queue
Unit 4 queue
 
Unit 8 searching and hashing
Unit   8 searching and hashingUnit   8 searching and hashing
Unit 8 searching and hashing
 
Unit 3 stack
Unit   3 stackUnit   3 stack
Unit 3 stack
 
Unit 2 algorithm
Unit   2 algorithmUnit   2 algorithm
Unit 2 algorithm
 

Recently uploaded

Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Recently uploaded (20)

Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

Mobile databases

  • 2. Introduction  Recent advances in portable and wireless technology have led to mobile computing, a new dimension in data communication and processing.  Portable computing devices coupled with wireless communications allow clients to access data from virtually anywhere and at any time.  The mobile computing platform allows users to establish communication with other users and to manage their work while they are mobile.  This feature is especially useful to geographically dispersed organizations. 2
  • 3. Introduction  What is mobile computing? • Users with portable computers still have network connections while they move. • Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. 3
  • 5. 5 Fully connected information space  Each node of the information space has some communication capability.  Some node can process information.  Some node can communicate through voice channel.  Some node can do both  Can be created and maintained by integrating legacy database systems, and wired and wireless systems.
  • 6. Problems in Mobile Computing  There are a number of hardware and software problems that must be resolved before the capabilities of mobile computing can be fully utilized  Some of the software problems – which may involve data management, transaction management, and database recovery – have their origins in distributed database systems  In mobile computing, the problems are more difficult, mainly because of:  The limited and intermittent connectivity afforded by wireless communications  The limited life of the power supply(battery)  The changing topology of the network  In addition, mobile computing introduces new architectural possibilities and challenges 6
  • 7. 7 Mobile Objects • A mobile object is some code that carries a state • Lives in a host • That visits places • which is let in when trusted • and barred when untrusted • and will refuse to go to untrustworthy places
  • 8. Mobile Database  A mobile database is a database that can be connected to by a mobile computing device over a wireless mobile network.  Mobile databases: • Physically separate from the central database server. • Resided on mobile devices. • Capable of communicating with a central database server or other mobile clients from remote sites. • Handle local queries without connectivity. 8
  • 9. Why Mobile Databases?  Mobile data-driven applications enable us to access any data from anywhere, anytime.  Examples: • Salespersons can update sales records on the move. • Reporters can update news database anytime. • Doctors can retrieve patient’s medical history from anywhere.  Mobile DBMSs are needed to support these applications data processing capabilities. 9
  • 10. Mobile Computing Architecture  The general architecture of a mobile platform is a distributed architecture where a number of computers, generally referred to as Fixed Hosts and Base Stations, are interconnected through a high speed wired network  Fixed hosts are general purpose computers that are not typically equipped to manage mobile units but can be configured to do so  Base stations function as a gateways to the fixed network for the Mobile Units; They are equipped with wireless interfaces and offer network access services of which mobile units are clients 10
  • 11. Mobile Computing Architecture Fig: A general architecture of a mobile platform 11
  • 12. Base Station (BS):  A network element that interconnects the mobile station (or Mobile unit (MU)) to the network via the air interface.  Each cell in the network has a BS associated with it.  The primary function of a BS is to maintain the air interface, or medium, for communication to any mobile unit within its cell.  Other functions of BS are call processing, signaling, maintenance, and diagnostics. 12 Mobile Computing Architecture
  • 13. Mobile Units (MU)  Also called Mobile Systems (MS) or Mobile Hosts (MH).  Mobile units are battery-powered portable computers that move freely in a geographic mobility domain, an area that is restricted by the limited bandwidth of wireless communication channels.  It consists of three components: (a) transceiver, (b) antenna, and (c) user interface.  The user interface exists only at MU, which consists of a display, a keypad for entering information, and an audio interface for speaking and hearing voice conversation. This can be a laptop, a palmtop, or a cell phone, or any other mobile device.  A downlink channel is used for sending data from a BS to an MU and an uplink channel is used for sending data from an MU to its BS. 13 Mobile Computing Architecture
  • 14. Mobile Computing Architecture  Wireless Communications: • The wireless medium on which mobile units and base stations communicate have bandwidths significantly lower than those of a wired network • Some wireless access options allow seamless roaming throughout a geographical region (e.g., cellular networks), whereas WiFi networks are localized around a base station; • Some wireless networks, such as WiFi and Bluetooth, use unlicensed areas of frequency spectrum, which may cause interference with other appliances, such as cordless telephones; • Modern wireless networks can transfer data in units called packets, that are commonly used in wired networks in order to conserve bandwidth; • Wireless applications must consider these characteristics when choosing a communication option 14
  • 15. Mobile Computing Architecture  Client/Network Relationships: • Mobile units can move freely in a geographic mobility domain, an area that is circumscribed by wireless network coverage; • To manage the mobility of units, the entire geographic mobility domain is divided into one or more smaller domains, called cells, each of which is supported by at least one base station; • The mobile discipline requires that the movement of mobile units be unrestricted throughout the cells of a geographic mobility domain, while maintaining information access contiguity – i.e. intercell movement, does not negatively affect the data retrieval process; 15
  • 16. Mobile Computing Architecture  The mobile computing platform can be effectively described under the client-server paradigm, which means we may sometimes refer to a mobile unit as a client or sometimes as a user, and the base stations as servers.  Each cell is managed by a base station, which contains transmitters and receivers for responding to the information-processing needs of clients located in the cell.  We assume that the average query response time is much shorter than the time required by the client to physically traverse a cell.  Clients and servers communicate through wireless channels. 16 Client/Network Relationships:
  • 17. 17
  • 18. 18
  • 19. Mobile Computing Architecture  Wireless communications for mobile ad-hoc network (MANET) is different; In a MANNET, co-located mobile units do not need to communicate via a fixed network, but instead, from their own using cost- effective technologies such as Bluetooth;  In a MANNET, mobile units are responsible for routing their own data, effectively acting as base stations as well as clients; They must be robust enough to handle changes in the network topology, such as the arrival or departure of other mobile units  MANNET applications can be considered as peer-to-peer, meaning that a mobile unit is simultaneously a client and a server;  Transaction processing and data consistency control become more difficult since there is no central control;  Resource discovery and data routing by mobile units make computing even more complicated 19
  • 20. Characteristics of Mobile Environments  The characteristics of mobile computing include high communication latency, intermittent wireless connectivity, limited battery life, and changing client location  Latency is caused by the processes unique to the wireless medium, such as coding data for wireless transfer, and tracking and filtering wireless signals at the receiver  Intermittent connectivity can be intentional or unintentional; unintentional disconnections happen in areas where wireless signals cannot reach, e.g., elevator shafts or subway tunnels; Intentional disconnections occur by user intent, e.g., during an airplane takeoff, or when the mobile device is powered down 20
  • 21.  Battery life is directly related to battery size, and indirectly related to the mobile device’s capabilities  Client locations are expected to change, which alters the network topology and may cause their data requirements to change  All these characteristics impact data management, and robust mobile applications must consider them  To compensate for high latencies and unreliable connectivity, clients cache replicas of important, frequently accessed data, and work offline, if necessary; Besides increasing data availability and response time, caching can also reduce client power consumption by eliminating the need to make energy-consuming wireless data transmission for each data access 21 Characteristics of Mobile Environments
  • 22.  The server may not be able to reach a client; A client may be unreachable because it is dozing – in an energy-conserving state in which many subsystems are shut down – or because it is out of range of a base station; In either case, neither client nor server can reach the other, and modifications must be made to the architecture in order to compensate for this case;  Proxies for unreachable components are added to the architecture; For a client (and symmetrically for a server), the proxy can cache updates intended for the server; When a connection becomes available, the proxy automatically forwards these cached updates to their ultimate destination 22 Characteristics of Mobile Environments
  • 23.  Mobile computing poses challenges for servers as well as clients;  The latency involved in wireless communication makes scalability a problem; Since latency due to wireless communications increases the time to service each client request, the server can handle fewer clients;  One way servers relieve this problem is by broadcasting data whenever possible; A server can simply broadcast data periodically; Broadcast also reduces the load on the server, as clients do not have to maintain active connections to it 23 Characteristics of Mobile Environments
  • 24. Characteristics of Mobile Environments  Client mobility also poses many data management challenges; Servers must keep track of client locations in order to efficiently route messages to them;  Client data should be stored in the network location that minimizes the traffic necessary to access it.;  The act of moving between cells must be transparent to the client;  The server must be able to gracefully divert the shipment of data from one base to another, without the client noticing; Client mobility also allows new applications that are location-based 24
  • 25. Types of Data in Mobile Application  Mobile applications can be categorized in two ways: (1) vertical applications and (2) horizontal applications.  In vertical applications users access data within a specific cell, and access is denied to users outside of that cell. For example, users can obtain information on the location of doctors or emergency centers within a cell or parking availability data at an airport cell.  In horizontal applications, users cooperate on accomplishing a task, and they can handle data distributed throughout the system. The horizontal application market is massive; two types of applications most mentioned are mail-enabled applications and information services to mobile users. 25
  • 26.  Data may be classified into three categories: 1. Private data: A single user owns this data and manages it. No other user may access it. 2. Public data: This data can be used by anyone who can read it. Only one source updates it. Examples include weather bulletins or stock prices. 3. Shared data: This data is accessed both in read and write modes by groups of users. Examples include inventory data for products in a company.  Public data is primarily managed by vertical applications, while shared data is used by horizontal applications, possibly with some replication. Copies of shared data may be stored both in base and mobile stations. 26Types of Data in Mobile Application
  • 27. Data Management Issues  From a data management standpoint, mobile computing may be considered a variation of distributed computing  Mobile databases can be distributed under two possible scenarios: 1. The entire database is distributed mainly among the wired components, possibly with full or partial replication; A base station or fixed host manages its own database with a DBMS-like functionality, with additional functionality for locating mobile units and additional query and transaction management features to meet the requirements of mobile environments 2. The database is distributed among wired and wireless components; Data management responsibility is shared among base stations or fixed hosts and mobile units 27
  • 28. Data Management Issues  The distributed data management issues can also be applied to mobile databases with the following additional considerations and variations: • Data distribution and replication – Data is unevenly distributed among the base stations and mobile units • Transactions models – Issues of fault tolerance and correctness of transactions are aggravated • Query processing – Awareness of where data is located is important and affects the cost/benefit analysis of query processing; Query optimization is more complicated because of mobility and rapid resource changes of mobile units • Recovery and fault tolerance – The mobile database environment must deal with site, media, transaction, and communication failure 28
  • 29. Data Management Issues  Mobile database design – The global name resolution problem for handling queries is compounded because of mobility and frequent shutdown  Location-based service – As clients move, location-dependent cache information may become stale  Division of labor – Certain characteristics of the mobile environment force a change in the division of labor in query processing  Security – Mobile data is less secure than that which is left at the fixed location 29
  • 30. 30 Applications of Mobile Computing • For Estate Agents • In courts • In companies • Stock Information Collection/Control • Credit Card Verification • Taxi/Truck Dispatch • Electronic Mail/Paging
  • 31. Challenges  Disconnection  Low bandwidth  High bandwidth variability  Low power and resources  Security risks  Wide variety terminals and devices with different capabilities  Device attributes  Fit more functionality into single, smaller device 31
  • 32. 32