SlideShare a Scribd company logo
1 of 3
Download to read offline
Query processing and Transaction management in
                    Mobile Databases
                                       Nimisha Sara Mathews and Rini Mary Varghese
                                        Dept. of Computer Science and Engineering,
                                          National Institute of Technology, Calicut,
                                                        Kerala, India

                                                                   generally more prone to error. ACID properties (Atomicity,
 Abstract-                                                         Consistency, Isolation, and Durability) are too rigid for
Widespread use of Mobile devices in E-commerce or M-               Mobile database Systems. So, a part of the transaction can be
commerce has lead to a tremendous surge in the research in         executed and committed independent to its other parts [5].
Mobile Database Systems. In this paper, we discuss some of the
                                                                   Mobile transaction processing has become a challenging study
latest methodologies for query processing and management of
transactions in mobile databases.                                  field because of the above characteristics of mobile
                                                                   transaction.
                      I. INTRODUCTION
                                                                                      II. QUERY PROCESSING
Nowadays, there are various popular wireless devices such as       In mobile databases, bandwidth is scarce, so we have to
cellular phones, personal digital assistants, and laptop           optimize the number of bytes transmitted for dispatching
computers with millions of users. The mobile computing             query results. A query optimizer as demonstrated in [2]
environment has two parts, namely, mobile computers or             incorporates Multiple Query Processing technique and the
mobile devices and a wired network of computers. In a mobile       results of multiple queries must be sent in the common
database the database and the corresponding database server        broadcast channel in such a way that the sender of a specific
lie in the wired network of computers referred to above, and       query can get access to the result of his query only. To
the database clients lie in the mobile devices. Mobile devices     perform Multiple Query Processing we have to choose a group
send queries to the server. The mobile database server             of queries and process them simultaneously.
processes those queries and may send the results to the
respective senders.                                                The system performs its operation in the following steps.
                                                                     1. Collection of queries.
 A mobile user can get data from the server in two methods:          2. Decomposition into groups.
pull-based and push-based. In a pull-based method there are          3. Computation of supersets.
two channels namely an uplink channel and a downlink                 4. User specific encryption of the superset
channel. A mobile device sends the query to the server via the       5. Broadcasting the superset.
uplink channel and the query results come to the device via the      6. Extraction of the individual results.
downlink channel which is private to each mobile device. In a      1) Collection of queries: The optimizer is a multithreaded
push-based method the server broadcasts the data on a              program. In this step the main thread of the program waits for
broadcast channel and the mobile devices tune to that channel      a specific time window and collects all the queries arriving at
to retrieve their necessary information. In this case the server   the server.
has to periodically broadcast information to the clients. In a
hybrid model, the push-based method is extended by using an        2) Decomposition into groups: Based on structural similarity
uplink channel via which clients can send explicit requests.       the queries collected in a specific time window are
From the point of view of query processing we note that in a       decomposed into groups such that the queries in a group have
push-based method answers for each query are sent separately.      maximum possible commonality.
But if there be common data among some of the query results
it has to be sent once for each query [3]. This results in poor
bandwidth utilization and there is scope for query
optimization.

Due to frequent disconnections and limited communication
bandwidth, usual transaction models may not work in the case
of mobile database systems. In the processing of mobile
transactions, the location change of mobile computers will
bring about complex switchover problem of region and it is
For example, let us consider the following incoming queries in
a specific time window

Q1: select lno from loan , branch where amt between 900 and
1400 and assets >= 1700000 and loan.bname = branch.bname

Q2: select bname from branch where bcity = „Brooklyn‟

Q3: select lno from loan , branch where amt between 950 and
1500 and assets >= 2100000 and loan.bname = branch.bname            4) User specific encryption of the superset- Each mobile
                                                                    device can read the whole superset but they accept some of the
From this we see that the queries Q1 and Q3 have the identical      tuples and reject others according to the bit streams sent to
projection list and table list. Therefore Q1 and Q3 will be         them. There is chance that a malicious user will accept tuples
members of same group.                                              that are not part of his result. Therefore User specific
3) Superset computation                                             encryption has to be performed, by a randomly created key,
                                                                    for each user, before broadcasting the superset.
Superset computation algorithm examines the predicates of the
queries in the group and identifies the range of attribute values   5) Broadcasting the encrypted superset- The superset so
each query requires from each table in that group. The              computed is broadcast on the broadcast channel. Individual
algorithm is used for identifying the ranges.                       mobile devices have to find out individual results from the
                                                                    superset. The server also sends a bit stream to each mobile
For example, in query Q1 we have the predicate “amt between         device through the point-to-point channels to them.
900 and 1400”. From this we get the range [900, 1400].
Similarly, from predicate “amt between 950 and 1500” in Q3          6) Extraction of individual results- Each mobile device uses
we get the range [950, 1500]. The predicate “assets >=              the information sent via point-to-point channels to tune to the
1700000” in Q1 gives the range [1700000, MAX_ASSETS]                broadcast channel for specific time periods and decrypt the
and “assets >= 2100000” in Q3 gives [2100000,                       information using corresponding keys and thus receive their
MAX_ASSETS]. Here MAX_ASSETS is the maximum value                   own tuples.
of the attribute assets in the table loan. Now from the table
loan we select tuples with 900 <= amt <= 1500 to form a new                      III. TRANSACTION MANAGEMENT
table loan‟ and from the table branch we select tuples with
1700000 <= assets <= 9000000 to form a new table branch‟.            User issues transactions from his/her Mobile unit (MU) and
                                                                    the final result comes back to the same MU. The transaction
                                                                    may not be completely executed at the MU so it is fragmented
                                                                    and distributed among database servers for execution. Certain
                                                                    Transaction models which coordinate this distributed
                                                                    execution are described below.

                                                                    Each base station (BS) serves a fixed geographical area, also
                                                                    known as a cell. As a mobile device moves from one cell to
                                                                    another, the base station hands over the control to the base
                                                                    station in another cell.

                                                                    In Kangaroo Model, as the transactions hop from one site to
                                                                    another, the management of the transaction also moves. When
                                                                    a mobile host connects to a different BS, communication will
                                                                    take place with the previous BS in order to transfer transaction
                                                                    information to the new BS [5]. Then, a new JT (Joey
                                                                    transaction) will be created in the new BS.

                                                                    Pro-Motion model supports transactions in which mobile
Join is performed on the tables and the column which is to be       devices are disconnected from the central database server.
broadcasted is obtained by a projection operation on the join       Transactions are allowed through the data cached on mobile
result.                                                             devices, but there are restrictions in terms of operations
                                                                    allowed and data expiration. The local transactions that occur
                                                                    on a mobile device are committed to the database server when
                                                                    it reconnects to the network [5].
Another recently developed efficient transaction model by
Abdul-Mehdi et al [4]. suggests that transaction execution can
be done at the BS and MUs. Transactions at an MU can update
data locally and then precommit. When the MU connects to
the BS, these precommitted transactions are sent to the BS and
re-executed as base transactions (BT). BTs are serialized on
the master copy of the data stored at the BS. This will result in
data consistency.

In Mobile Database Systems, a transaction may be fragmented
and may run at more than one nodes. An efficient commit
protocol is necessary. 2-phase commit or 3-phase commit is
no good because of their generous messaging requirement. A
scheme which uses very few messages, especially wireless, is
desirable. One possible scheme is “timeout” based protocol.
As per this protocol, nodes guarantee to complete the
execution of their fragments of a mobile transaction within
their predefined timeouts.    Thus, during processing no
communication is required. At the end of timeout, each node
commits their fragment independently.


                            IV. CONCLUSION

The amount of research in the area of Mobile databases in the
last few years have been staggering. However, some problems
remain open for research. There is a need for better protocols
in the area of query optimisation and transaction management.


                                REFERENCES
[1]   D.Barbara, “Mobile Computing and Databases-A Survey,” IEEE Trans.
      Knowl. Data Eng., vol. 11, Jan/Feb 1999.
[2]   D. Saha and N. Chowdhury, “A Method for Secure Query Processing in
      Mobile Databases”, Engineering letters, 14:1, Feb 2007.
[3]    R. Malladi and K. C. Davis, “Applying Multiple Query Optimization in
      Mobile Databases” in Proceedings of the 36th Hawaii International
      Conference on System Sciences, 2003 IEEE
[4]   Z.T. Abdul-Mehdi et al, “A model for transaction management in mobile
      databases”, IEEE potentials, vol. 29, 2010
[5]   W.D. Yu and S.Sharma, “A Mobile Database Design Methodology for
      Mobile Software Solutions,” in 31st Annual International Computer
      Software and Applications Conference, 2007 IEEE

More Related Content

What's hot

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locationsambitlick
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
 
emerging_2015_3_20_50041
emerging_2015_3_20_50041emerging_2015_3_20_50041
emerging_2015_3_20_50041Hanin Almutairi
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicastingingenioustech
 
Gsm 03-42 v300
Gsm 03-42 v300Gsm 03-42 v300
Gsm 03-42 v300Bob Huang
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]ingenioustech
 
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORKTRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORKcscpconf
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesambitlick
 
Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm amal algedir
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicasIJCNCJournal
 
Efficient Belief Propagation in Depth Finding
Efficient Belief Propagation in Depth FindingEfficient Belief Propagation in Depth Finding
Efficient Belief Propagation in Depth FindingSamantha Luber
 

What's hot (17)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
 
emerging_2015_3_20_50041
emerging_2015_3_20_50041emerging_2015_3_20_50041
emerging_2015_3_20_50041
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
Gsm 03-42 v300
Gsm 03-42 v300Gsm 03-42 v300
Gsm 03-42 v300
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORKTRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
 
50 55
50 5550 55
50 55
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homes
 
Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm
 
Communication assignment
Communication assignmentCommunication assignment
Communication assignment
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicas
 
Efficient Belief Propagation in Depth Finding
Efficient Belief Propagation in Depth FindingEfficient Belief Propagation in Depth Finding
Efficient Belief Propagation in Depth Finding
 

Viewers also liked

רואה+היבא
רואה+היבארואה+היבא
רואה+היבאhebazahwy
 
The Fantastiks
The FantastiksThe Fantastiks
The Fantastiksmbrown1808
 
רואה+רדא... (1)
רואה+רדא... (1)רואה+רדא... (1)
רואה+רדא... (1)hebazahwy
 
Bathroom Suites - Ideal Standard Ireland - Concept brochure 2011
Bathroom Suites - Ideal Standard Ireland - Concept brochure 2011Bathroom Suites - Ideal Standard Ireland - Concept brochure 2011
Bathroom Suites - Ideal Standard Ireland - Concept brochure 2011Bathrooms NI
 
Gender mainstreaming of public campaigns
Gender mainstreaming of public campaignsGender mainstreaming of public campaigns
Gender mainstreaming of public campaignsElise Beyst
 
Ppt nl kanselarij 16012012
Ppt nl kanselarij 16012012Ppt nl kanselarij 16012012
Ppt nl kanselarij 16012012Elise Beyst
 
Bathroom Suite Ireland - Playa brochure 2011
Bathroom Suite Ireland - Playa brochure 2011Bathroom Suite Ireland - Playa brochure 2011
Bathroom Suite Ireland - Playa brochure 2011Bathrooms NI
 
Formation chancellerie une gestion sensible au genre_mtimmerman_jan 2012
Formation chancellerie une gestion sensible au genre_mtimmerman_jan 2012Formation chancellerie une gestion sensible au genre_mtimmerman_jan 2012
Formation chancellerie une gestion sensible au genre_mtimmerman_jan 2012Elise Beyst
 

Viewers also liked (14)

רואה+היבא
רואה+היבארואה+היבא
רואה+היבא
 
The Fantastiks
The FantastiksThe Fantastiks
The Fantastiks
 
Reka
RekaReka
Reka
 
רואה+רדא... (1)
רואה+רדא... (1)רואה+רדא... (1)
רואה+רדא... (1)
 
Frases en ingles
Frases en inglesFrases en ingles
Frases en ingles
 
Bathroom Suites - Ideal Standard Ireland - Concept brochure 2011
Bathroom Suites - Ideal Standard Ireland - Concept brochure 2011Bathroom Suites - Ideal Standard Ireland - Concept brochure 2011
Bathroom Suites - Ideal Standard Ireland - Concept brochure 2011
 
Gender mainstreaming of public campaigns
Gender mainstreaming of public campaignsGender mainstreaming of public campaigns
Gender mainstreaming of public campaigns
 
Heba
HebaHeba
Heba
 
Heba
HebaHeba
Heba
 
Ppt nl kanselarij 16012012
Ppt nl kanselarij 16012012Ppt nl kanselarij 16012012
Ppt nl kanselarij 16012012
 
Bathroom Suite Ireland - Playa brochure 2011
Bathroom Suite Ireland - Playa brochure 2011Bathroom Suite Ireland - Playa brochure 2011
Bathroom Suite Ireland - Playa brochure 2011
 
Corporate credentials
Corporate credentialsCorporate credentials
Corporate credentials
 
Formation chancellerie une gestion sensible au genre_mtimmerman_jan 2012
Formation chancellerie une gestion sensible au genre_mtimmerman_jan 2012Formation chancellerie une gestion sensible au genre_mtimmerman_jan 2012
Formation chancellerie une gestion sensible au genre_mtimmerman_jan 2012
 
Climate of the Nation 2016
Climate of the Nation 2016Climate of the Nation 2016
Climate of the Nation 2016
 

Similar to Group2

Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...ijcsit
 
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing SystemsEffective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing Systemsijwmn
 
Performance evaluation of transaction processing in mobile data base systems
Performance evaluation of transaction processing in mobile data base systemsPerformance evaluation of transaction processing in mobile data base systems
Performance evaluation of transaction processing in mobile data base systemsijdms
 
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTSECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTcscpconf
 
Network assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingNetwork assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingJPINFOTECH JAYAPRAKASH
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...Nico Huysamen
 
Network assisted mobile computing with optimal uplink quary processing
Network assisted mobile computing with optimal uplink quary processingNetwork assisted mobile computing with optimal uplink quary processing
Network assisted mobile computing with optimal uplink quary processingShakas Technologies
 
Mobility Management Scheme for Mobile Communication Systems. A Review
Mobility Management Scheme for Mobile Communication Systems. A ReviewMobility Management Scheme for Mobile Communication Systems. A Review
Mobility Management Scheme for Mobile Communication Systems. A Reviewiosrjce
 
J010627176.iosr jece
J010627176.iosr jeceJ010627176.iosr jece
J010627176.iosr jeceIOSR Journals
 
A Dynamically-adaptive Resource Aware Load Balancing Scheme for VM migrations...
A Dynamically-adaptive Resource Aware Load Balancing Scheme for VM migrations...A Dynamically-adaptive Resource Aware Load Balancing Scheme for VM migrations...
A Dynamically-adaptive Resource Aware Load Balancing Scheme for VM migrations...IOSR Journals
 
Resource Allocation using Virtual Machine Migration: A Survey
Resource Allocation using Virtual Machine Migration: A SurveyResource Allocation using Virtual Machine Migration: A Survey
Resource Allocation using Virtual Machine Migration: A Surveyidescitation
 
Distributed database architecture for global roaming in next generation mobil...
Distributed database architecture for global roaming in next generation mobil...Distributed database architecture for global roaming in next generation mobil...
Distributed database architecture for global roaming in next generation mobil...Mumbai Academisc
 
Role of Virtual Machine Live Migration in Cloud Load Balancing
Role of Virtual Machine Live Migration in Cloud Load BalancingRole of Virtual Machine Live Migration in Cloud Load Balancing
Role of Virtual Machine Live Migration in Cloud Load BalancingIOSR Journals
 

Similar to Group2 (20)

Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
 
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing SystemsEffective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
 
Performance evaluation of transaction processing in mobile data base systems
Performance evaluation of transaction processing in mobile data base systemsPerformance evaluation of transaction processing in mobile data base systems
Performance evaluation of transaction processing in mobile data base systems
 
Nirmala
NirmalaNirmala
Nirmala
 
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTSECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
 
Network assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingNetwork assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processing
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
 
Network assisted mobile computing with optimal uplink quary processing
Network assisted mobile computing with optimal uplink quary processingNetwork assisted mobile computing with optimal uplink quary processing
Network assisted mobile computing with optimal uplink quary processing
 
Mobility Management Scheme for Mobile Communication Systems. A Review
Mobility Management Scheme for Mobile Communication Systems. A ReviewMobility Management Scheme for Mobile Communication Systems. A Review
Mobility Management Scheme for Mobile Communication Systems. A Review
 
J010627176.iosr jece
J010627176.iosr jeceJ010627176.iosr jece
J010627176.iosr jece
 
Unit 2
Unit 2Unit 2
Unit 2
 
A Dynamically-adaptive Resource Aware Load Balancing Scheme for VM migrations...
A Dynamically-adaptive Resource Aware Load Balancing Scheme for VM migrations...A Dynamically-adaptive Resource Aware Load Balancing Scheme for VM migrations...
A Dynamically-adaptive Resource Aware Load Balancing Scheme for VM migrations...
 
Sdn04
Sdn04Sdn04
Sdn04
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
Resource Allocation using Virtual Machine Migration: A Survey
Resource Allocation using Virtual Machine Migration: A SurveyResource Allocation using Virtual Machine Migration: A Survey
Resource Allocation using Virtual Machine Migration: A Survey
 
Distributed database architecture for global roaming in next generation mobil...
Distributed database architecture for global roaming in next generation mobil...Distributed database architecture for global roaming in next generation mobil...
Distributed database architecture for global roaming in next generation mobil...
 
Resume
ResumeResume
Resume
 
Role of Virtual Machine Live Migration in Cloud Load Balancing
Role of Virtual Machine Live Migration in Cloud Load BalancingRole of Virtual Machine Live Migration in Cloud Load Balancing
Role of Virtual Machine Live Migration in Cloud Load Balancing
 
20240
2024020240
20240
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Group2

  • 1. Query processing and Transaction management in Mobile Databases Nimisha Sara Mathews and Rini Mary Varghese Dept. of Computer Science and Engineering, National Institute of Technology, Calicut, Kerala, India generally more prone to error. ACID properties (Atomicity, Abstract- Consistency, Isolation, and Durability) are too rigid for Widespread use of Mobile devices in E-commerce or M- Mobile database Systems. So, a part of the transaction can be commerce has lead to a tremendous surge in the research in executed and committed independent to its other parts [5]. Mobile Database Systems. In this paper, we discuss some of the Mobile transaction processing has become a challenging study latest methodologies for query processing and management of transactions in mobile databases. field because of the above characteristics of mobile transaction. I. INTRODUCTION II. QUERY PROCESSING Nowadays, there are various popular wireless devices such as In mobile databases, bandwidth is scarce, so we have to cellular phones, personal digital assistants, and laptop optimize the number of bytes transmitted for dispatching computers with millions of users. The mobile computing query results. A query optimizer as demonstrated in [2] environment has two parts, namely, mobile computers or incorporates Multiple Query Processing technique and the mobile devices and a wired network of computers. In a mobile results of multiple queries must be sent in the common database the database and the corresponding database server broadcast channel in such a way that the sender of a specific lie in the wired network of computers referred to above, and query can get access to the result of his query only. To the database clients lie in the mobile devices. Mobile devices perform Multiple Query Processing we have to choose a group send queries to the server. The mobile database server of queries and process them simultaneously. processes those queries and may send the results to the respective senders. The system performs its operation in the following steps. 1. Collection of queries. A mobile user can get data from the server in two methods: 2. Decomposition into groups. pull-based and push-based. In a pull-based method there are 3. Computation of supersets. two channels namely an uplink channel and a downlink 4. User specific encryption of the superset channel. A mobile device sends the query to the server via the 5. Broadcasting the superset. uplink channel and the query results come to the device via the 6. Extraction of the individual results. downlink channel which is private to each mobile device. In a 1) Collection of queries: The optimizer is a multithreaded push-based method the server broadcasts the data on a program. In this step the main thread of the program waits for broadcast channel and the mobile devices tune to that channel a specific time window and collects all the queries arriving at to retrieve their necessary information. In this case the server the server. has to periodically broadcast information to the clients. In a hybrid model, the push-based method is extended by using an 2) Decomposition into groups: Based on structural similarity uplink channel via which clients can send explicit requests. the queries collected in a specific time window are From the point of view of query processing we note that in a decomposed into groups such that the queries in a group have push-based method answers for each query are sent separately. maximum possible commonality. But if there be common data among some of the query results it has to be sent once for each query [3]. This results in poor bandwidth utilization and there is scope for query optimization. Due to frequent disconnections and limited communication bandwidth, usual transaction models may not work in the case of mobile database systems. In the processing of mobile transactions, the location change of mobile computers will bring about complex switchover problem of region and it is
  • 2. For example, let us consider the following incoming queries in a specific time window Q1: select lno from loan , branch where amt between 900 and 1400 and assets >= 1700000 and loan.bname = branch.bname Q2: select bname from branch where bcity = „Brooklyn‟ Q3: select lno from loan , branch where amt between 950 and 1500 and assets >= 2100000 and loan.bname = branch.bname 4) User specific encryption of the superset- Each mobile device can read the whole superset but they accept some of the From this we see that the queries Q1 and Q3 have the identical tuples and reject others according to the bit streams sent to projection list and table list. Therefore Q1 and Q3 will be them. There is chance that a malicious user will accept tuples members of same group. that are not part of his result. Therefore User specific 3) Superset computation encryption has to be performed, by a randomly created key, for each user, before broadcasting the superset. Superset computation algorithm examines the predicates of the queries in the group and identifies the range of attribute values 5) Broadcasting the encrypted superset- The superset so each query requires from each table in that group. The computed is broadcast on the broadcast channel. Individual algorithm is used for identifying the ranges. mobile devices have to find out individual results from the superset. The server also sends a bit stream to each mobile For example, in query Q1 we have the predicate “amt between device through the point-to-point channels to them. 900 and 1400”. From this we get the range [900, 1400]. Similarly, from predicate “amt between 950 and 1500” in Q3 6) Extraction of individual results- Each mobile device uses we get the range [950, 1500]. The predicate “assets >= the information sent via point-to-point channels to tune to the 1700000” in Q1 gives the range [1700000, MAX_ASSETS] broadcast channel for specific time periods and decrypt the and “assets >= 2100000” in Q3 gives [2100000, information using corresponding keys and thus receive their MAX_ASSETS]. Here MAX_ASSETS is the maximum value own tuples. of the attribute assets in the table loan. Now from the table loan we select tuples with 900 <= amt <= 1500 to form a new III. TRANSACTION MANAGEMENT table loan‟ and from the table branch we select tuples with 1700000 <= assets <= 9000000 to form a new table branch‟. User issues transactions from his/her Mobile unit (MU) and the final result comes back to the same MU. The transaction may not be completely executed at the MU so it is fragmented and distributed among database servers for execution. Certain Transaction models which coordinate this distributed execution are described below. Each base station (BS) serves a fixed geographical area, also known as a cell. As a mobile device moves from one cell to another, the base station hands over the control to the base station in another cell. In Kangaroo Model, as the transactions hop from one site to another, the management of the transaction also moves. When a mobile host connects to a different BS, communication will take place with the previous BS in order to transfer transaction information to the new BS [5]. Then, a new JT (Joey transaction) will be created in the new BS. Pro-Motion model supports transactions in which mobile Join is performed on the tables and the column which is to be devices are disconnected from the central database server. broadcasted is obtained by a projection operation on the join Transactions are allowed through the data cached on mobile result. devices, but there are restrictions in terms of operations allowed and data expiration. The local transactions that occur on a mobile device are committed to the database server when it reconnects to the network [5].
  • 3. Another recently developed efficient transaction model by Abdul-Mehdi et al [4]. suggests that transaction execution can be done at the BS and MUs. Transactions at an MU can update data locally and then precommit. When the MU connects to the BS, these precommitted transactions are sent to the BS and re-executed as base transactions (BT). BTs are serialized on the master copy of the data stored at the BS. This will result in data consistency. In Mobile Database Systems, a transaction may be fragmented and may run at more than one nodes. An efficient commit protocol is necessary. 2-phase commit or 3-phase commit is no good because of their generous messaging requirement. A scheme which uses very few messages, especially wireless, is desirable. One possible scheme is “timeout” based protocol. As per this protocol, nodes guarantee to complete the execution of their fragments of a mobile transaction within their predefined timeouts. Thus, during processing no communication is required. At the end of timeout, each node commits their fragment independently. IV. CONCLUSION The amount of research in the area of Mobile databases in the last few years have been staggering. However, some problems remain open for research. There is a need for better protocols in the area of query optimisation and transaction management. REFERENCES [1] D.Barbara, “Mobile Computing and Databases-A Survey,” IEEE Trans. Knowl. Data Eng., vol. 11, Jan/Feb 1999. [2] D. Saha and N. Chowdhury, “A Method for Secure Query Processing in Mobile Databases”, Engineering letters, 14:1, Feb 2007. [3] R. Malladi and K. C. Davis, “Applying Multiple Query Optimization in Mobile Databases” in Proceedings of the 36th Hawaii International Conference on System Sciences, 2003 IEEE [4] Z.T. Abdul-Mehdi et al, “A model for transaction management in mobile databases”, IEEE potentials, vol. 29, 2010 [5] W.D. Yu and S.Sharma, “A Mobile Database Design Methodology for Mobile Software Solutions,” in 31st Annual International Computer Software and Applications Conference, 2007 IEEE