SlideShare a Scribd company logo
1 of 23
Download to read offline
RECOVERY IN MOBILE DATABASE SYSTEM




TABLE OF CONTENT

ABSTRACT

INTRODUCTION

PREVIOUS WORK

SYSTEM MODEL

PROBLEM SPECIFICATION

METHODOLOGY

PROPOSED RECOVERY SCHEME

MERITS AND DEMERITS

FUTURE ASPECTS

CONCLUSION

REFERENCES




 ISE                       Page 1                               DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




ABSTRACT

Mobile computing is a rapidly emerging trend in distributed computing. This
new mobile computing environment poses challenging problems in designing
fault-tolerant systems because of the dynamics of mobility, and limited
bandwidth available on wireless links. Traditional fault-tolerance schemes,
therefore, cannot be directly applied to these systems. Mobile systems are often
subject to environmental conditions which can cause loss of communication or
data. Presented here is a scheme for recovery upon failure of a mobile host.
This report portrays the limitations of the mobile wireless environment and
improvement over existing recovery scheme is presented which suit the mobile
environment.




ISE                                 Page 2                                     DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




INTRODUCTION

The portable computers are fast catching up with the desktop workstations in
terms of computing power, memory, display and disk storage. This gives users
the   information     accessing    capability   regardless     of    the      location.
Telecommunication     companies    are   continuously    improving      the    quality,
security, availability, and reliability of cellular services and trying to enhance
its scope by providing new services like data management capabilities, which is
highly desirable. Motivated by such growing demand, an information processing
system is referred as the Mobile Database system (MDS). Mobile Database
System (MDS), in essence is a distributed client/server database system where
the entire processing environment is mobile. The actual database may be static
and stored at multiple sites but the data processing nodes, such as laptop,
PDA, cell phones, etc., may be mobile and can access desired data to           process
transactions from anywhere and at any time. In this report the main aim i s to
provide a scheme which will help a Mobile Unit (MU) recover efficiently,
taking reduced amount of time to recover from its last secure state. In the
process a strategy for efficiently managing a unified log for a MU is provided.




ISE                                   Page 3                                      DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




PREVIOUS WORK

       LAZY SCHEMES:- Lazy and Pessimistic schemes (asynchronous
        schemes) are reported in [8]. In a lazy scheme, logs are stored in the
        base station (BS) and, if the MU moves to a new BS, a pointer to the old
        BS is stored in the new BS. Pointers can be used during failure to
        recover the log distributed over several BS. This scheme has the
        advantage that it incurs relatively less network overhead during handoff
        as no log information needs to be transferred. Unfortunately, this
        scheme has a large recovery time.
       PESSIMISTIC SCHEME:- In the pessimistic scheme, the entire log
        and checkpoint record, if any, are transferred at each handoff. Hence,
        the recovery is fast but each handoff requires large volume of data
        transfer.
       SCHEMES       BASED ON THE MU’S MOVEMENT:- In these
        schemes, the list of BSs where the log is distributed is transferred during
        a handoff. This schemes fail when a MU recovers in a BS different than
        the one in which it crashed.
                 Distance based:- In the distance-based scheme, log
                    unification is done when the distance         covered    by MU
                    increases above a predefined value.


                   Frequency based :- In the frequency-based scheme, log
                    unification is performed when the number of handoffs seen
                    by the MU increases above a predefined value.




ISE                                    Page 4                                    DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




SYSTEM MODEL

Mobile networks have two components, a fixed backbone and a wireless
network. There are two distinct sets of entities, namely, mobile hosts and fixed
hosts. A host that can move while retaining its network connection is a mobile
host. The static network comprises of the fixed hosts and the communication
links between them. Some of the fixed hosts, called base stations (BS) are
augmented with a wireless interface, and, they provide a gateway for
communication between the wireless network and the static network.

Due to the limited range of the wireless transceivers, a MU can communicate
with a BS only within a limited geographical region around it. This region is
referred to as a Cell. The geographical area covered by a cell is a function of
the medium used for wireless communication. Due to mobility, the MU may
cross the boundary between two cells while being active. Thus, the task of
forwarding data between the static network and the mobile host must be
transferred to the new cell's BS. This process is known as Handoff.




ISE                                 Page 5                                     DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




PROBLEM SPECIFICATION
MDS recovery process is significantly more complex than conventional
systems mainly because of the following unique aspects of Mobile Environment


       LOCATION IS NOT FIXED:- As the user moves from one place to
        another, the location of the MU in the network changes.
       DISCONNECTION:- A MU can get disconnected. While disconnected,
        the mobile host is not able to send or receive any message. Protocols
        that need to exchange messages will not work correctly in this situation.
        During disconnection, the checkpoint protocol should provide a local
        recovery mechanism that allows the MU to recover from its own failures.
       BATTERIES HAVE LIMITED POWER:- The MU is often powered by
        batteries. Network transmissions and disk accesses are the two major
        power consuming operations. To minimize power consumption, the
        checkpoint protocol should reduce the amount of information that it
        adds to the application messages, and it should avoid sending extra
        messages.
       DIFFERENT TYPES OF FAILURES:- MU failure can be separated
        into two different categories.
                     Hard Failure:- It includes all     failures that can not be
                      repaired; for example, the MU falls and breaks, or is lost
                      or stolen.
                     Soft Failure:- It does not permanently damage the MU; for
                      example, the battery is discharged and the memory
                      contents are lost, or the operating system crashes.




ISE                                      Page 6                                    DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




       RANDOM HANDOFF :- MU’s may be subjected to handoff randomly.
        A handoff may affect recovery mainly because the location of the desired
        MU may not be immediately available for communication.
       WEAK WIRELESS LINK :- The BS and the MU are connected with an
        unreliable wireless link which is usually slow.




ISE                                    Page 7                                    DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




METHODOLOGY

Recovery is a mechanism to restore an intermediate consistent state of the
system which may be useful to avoid loosing all the work performed. Recovery
is made possible by maintaining log. Thus, an efficient recovery scheme
requires that the log management should be very efficient and must consume
minimum system resources and recreate the execution environment as soon
as possible after MU reboots.

The entire log must be carefully managed to help MU recover from every
possible failure in minimum time. Now Depending on the system specifications
and requirements, the appropriate recovery and handoff strategy needs to be
chosen. There are several factors which affect the recovery:-

       FAILURE RATE OF THE HOST:- System failures are caused by
        defects introduced in manufacturing or by transient or permanent faults
        occurring during operation.

       COMMUNICATION/ MOBILITY RATIO:- Communication refers to
        the number of messages sent/received by the mobile host and mobility
        refers to the number of moves the MU makes in a given period of time.
       MESSAGE SIZE:- Transmitting and receiving data consumes
        additional   power. In general, transmitting a given amount of data
        consumes twice as much power as receiving the same amount of data.
       MEMORY CONSTRAINTS:- A BS generally has many MUs in its cell. It
        is necessary to evaluate average memory requirements based on statistical
        data and the recovery schemes used.




ISE                                    Page 8                                    DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




       RECOVERY TIME: This is essentially the time required to recover a
        process upon failure. If the process has hard real-time deadlines, or
        requires high availability, the recovery upon a failure should be quick.




ISE                                   Page 9                                     DSCE
RECOVERY IN MOBILE DATABASE SYSTEM




PROPOSED RECOVERY SCHEME

In our approach we concentrate on recovering the MU state on its failure at the
time of handoff. A region in our approach is a set of all BS controlled by a
Mobile Switching Center. Designated Base Station(DBS) is the station where a
MU    registers     itself   for   first   time   within   a    Region.    It   has   following
characteristics:-

1. All log activity performed by a MU will be ultimately collected at this DBS

2. In every Region MU will have a different DBS.




                         Concept of Designated Base Station

INTER-REGION STRATEGY:- Amongst the region the approach works in
a way so as to avoid extra communication steps when MU moves from one
region to a new region. In this case MU has some log maintained at DBS in
Region1, now when the MU moves to Region 2, the first BS with which MH
registers becomes its DBS for new Region say Region 2. So Log will be
transferred from Region1 to Region2.




ISE                                          Page                                          DSCE
                                             10
RECOVERY IN MOBILE DATABASE SYSTEM




          Region (R)1                          Region (R)2




                        Inter Region Strategy



INTRA-REGION STRATEGY

         LOG TRANSFER FROM MOBILE CACHE TO BS:- When should
          MU transfer the entire gathered log to the BS. There are
          two cases, first of all if suppose MU’s cache is exhausted,
          immediately entire Log will be copied to current BS. In
          other case whenever MU moves away from the current BS
          and system detects Handoff, the MU will copy the entire log
          to BS and will move to new cell and the log would be
          appended to the previous Log file.

              Log appended




                Log Transfer from Mobile Cache to Base Station


ISE                                     Page                                      DSCE
                                        11
RECOVERY IN MOBILE DATABASE SYSTEM




       LOG MANAGEMENT:- MU carries following information for the
        purpose of registration-

        1. Previous BS identity.
        2. DBS identity.
        3. Own identity in the form of Connect (MHid, PBSid, DBSid).
        When any MU registers with a new BS which is not the DBS then the
        new BS say BS1 informs DBS about its reachability, saying ‘MU is with
        me’. Now since this message is received by DBS so it won’t do anything,
        just discard that message. The sequence of messages is shown in the
        figure below




                        Case 1 of Log Management
        Now when MU moves from BS1 to BS2, then BS2 informs          BS1    about
        its reachability. After receiving this info BS1 won’t pass delete
        message to DBS as BS1 knows that previous BS for the MU is DBS
        where all Log is collected. Now when MU moves further to another BS
        after handoff, say BS3 then again the same procedure is repeated. BS3
        will inform BS2 about MU’s reachability. Then BS2 will send delete
        message to BS1.After receiving the Delete message BS1 copies the
        entire log for MU which exists locally over to DBS and after it gets
        acknowledgement for data transfer it deletes that log entry from local
        space.
ISE                                  Page                                     DSCE
                                     12
RECOVERY IN MOBILE DATABASE SYSTEM




      Now if MU moves back to BS2 from BS3 then:-
      1. BS2 informs BS3 about MU’s reachability.
      2. BS3 checks if MU’s previous BS i.e. BS2 and its current BS are same.
      If both the BS are same then:
      - BS3 won’t send delete message to BS2.
      - BS3 will append Log to BS2 log.
      - BS3 will delete its copy of log.
      - BS2 clears its previous BS identity.
      - From BS2 MU will continue with original chain of activities.




                             Case 2 of Log Management




ISE                                   Page                                    DSCE
                                      13
RECOVERY IN MOBILE DATABASE SYSTEM




      Depending on where the MU recovers, there exist two cases for recovery:
      Case 1: If MU recovers in same BS where it crashed, then, that MU can
      use Log stored at that BS to rollback to previous state. If that log is not
      sufficient, then MU will need Log from its Previous BS.       If even that is
      also not enough, then BS will contact MU’s DBS to restore MU with all
      its previous state.
      Case 2: If MU fails in one BS, goes to another BS, and recovers there,
      then Handoff does not happen and also the new BS does not know
      about Previous BS identity. In this case the BS in which MU fails
      notifies DBS about the same and whenever MU tries to recover, the new
      BS fires query to DBS asking about the log for MU.




                            Case 3 of Log Management




ISE                                  Page                                      DSCE
                                     14
RECOVERY IN MOBILE DATABASE SYSTEM




      Case 4 of Log Management




ISE            Page                                    DSCE
               15
RECOVERY IN MOBILE DATABASE SYSTEM




MERITS AND OF PROPOSED SCHEME

       Preceding BS log maintenance gives latest recovery option.

       Unification at DBS avoids redundancy of logs.

       Loop is tackled.

       Auto unification of logs at one site helps:

               Quick recovery.

               Achieve real time system deadlines.

               Didn’t require to traverse a link list

DEMERITS OF PROPOSED SCHEME

       DBS with many MUs gets overburdened.
       Single point of failure.




ISE                                       Page                                       DSCE
                                          16
RECOVERY IN MOBILE DATABASE SYSTEM




FUTURE ASPECTS

For more efficient management of recovery information and faster recovery,
some other schemes can be employed which uses checkpoints and message
logs together in order to guarantee recovery and overcome the cost of storing
entire log at one place. The movement- based scheme can also be used which
considers Mobile Switching Center as a stable storage which considers both
of the failure-free operation cost and the recovery cost. Maintaining entire log
at one place in long run may make BS to run out of space so strategies should
be developed for Garbage Collection to flush the log at regular intervals.




ISE                                  Page                                      DSCE
                                     17
RECOVERY IN MOBILE DATABASE SYSTEM




CONCLUSION

In this paper, an efficient recovery scheme based on message logging for mobile
computing systems is presented. The mobile host carrying its recovery
information to its current BS can recover instantly in case of a failure. In the
proposed approach, the recovery information is not dispersed over a wide range
of cells so the recovery cost is not too high. As described in the scheme, while
the mobile host moves within a region, recovery information of the mobile host
is transferred among the BS of that region. However, if the mobile host moves
out of the region, then DBS transfers the recovery information to another
region’s DBS. The scheme controls the transfer cost as well as the recovery
cost.




ISE                                 Page                                       DSCE
                                    18
RECOVERY IN MOBILE DATABASE SYSTEM




REFERENCES

[1] Nuno Neves, W. Kent Fuchs, “Adaptive Recovery for Mobile           Environments”,
ACM Press, Vol.40, Issue 1, pp. 68 – 74, 1997.

[2] Bin Yao, W. Kent Fuchs, Kuo-Feng Ssu. "Message Logging in Mobile
Computing", IEEE Twenty-Ninth Annual International Symposium on Fault-
Tolerant Computing, 1999.

[3] Cris Pedregal Martin, Krithi Ramamritham, “Recovery            Guarantees       in
Mobile Systems”, Proc. of the 1st ACM international workshop on Data
Engineering for Wireless and Mobile Access, pp. 22-28, 1999.

[4] Cris Pedregal-Martin, Krithi Ramamritham, “Support           for     Recovery    in
Mobile Systems”, IEEE Transactions on Computers, v.51 no.10, pp. 1219-
1224, October 2002.
[5] Dhiraj K, Pradhan, P. Krishna, Nitin H. Vaidya, “Recoverable Mobile
Environments: Design and Trade-off Analysis”, ACM Press, 2001.
[6] Taesoon Park, Namyoon Woo, Heon Y. Yeom, “An Efficient Recovery
Scheme for Mobile Computing Environment”, ICPADS.
[7] Taesoon Park, Namyoon Woo, Heon Y. Yeom,“An Efficient Optimistic
Message Logging Scheme for the Recoverable Mobile Computing Systems”,
ISAS-SCI (1), 2001.
[8] P. Krishna, N. H. Vaidya and D. K. Pradhan, "Recovery in Distributed Mobile
Environments", IEEE Workshop on Advances in Parallel and Distributed
Systems, 1993.
[9] Sashidhar Gadiraju, Vijay Kumar, “Recovery in the Mobile Wireless
Environment Using Mobile Agents”, IEEE Transaction on Mobile Computing,
Vol. 3, No. 2, pp. 180-191.
[10]   R.   Koo,   and   S.   Toueg,“Checkpointing   and    Rollback-Recovery       for
Distributed Systems”,IEEE Trans. Software Eng.,Vol.13,No.1, pp. 23-31, 1987.


ISE                                    Page                                      DSCE
                                       19
RECOVERY IN MOBILE DATABASE SYSTEM




[11] L. Alvisi, and K. Marzullo, “Message Logging: Pessimistic, Optimistic,
Causal, and Optimal”, IEEE Trans. Software Eng., Vol. 24, No. 2, pp. 149-159,
1998.
[12] H. Higaki, M. Takizawa, “Checkpoint Recovery Protocol for Reliable Mobile
Systems”, the 17th IEEE Symposium on Reliable Distributed Systems.
[13]CHENG-MIN LIN AND CHYI-REN DOW, “Efficient Checkpoint-based Failure
Recovery Techniques in Mobile Computing Systems”, Journal of information
science and engineering 17, pp. 549-573, 2001.
[14] T. Park, N. Woo, H. Yeom, “Efficient Recovery Information Management
Schemes for the Fault Tolerant Mobile Computing Systems”, 20th IEEE
Symposium on Reliable Distributed Systems (SRDS'01).




ISE                                Page                                      DSCE
                                   20
RECOVERY IN MOBILE DATABASE SYSTEM




not even use the network's internet connection for Web surfing or other online
activities, this is referred to as piggybacking. [2] The idea behind this is to just
find the network and see that it exist, but don't connect to it in any way. This
will prevent you from breaking the law, because connecting to it is stealing and
is illegal by today's laws. Just because as a wardriving you don't mean to
connect doesn't mean that it is illegal. This can be a problem with some client
adapters that auto connect to the a network whenever it comes into range. This
is still illegal to connect to any of there non-public access points without
permission. The keys on this part is a wardriver is responsible for the hardware
that they choose, so make sure that it is running as expected and don't get
caught in a situation where something illegal could be taking place. The main
thing with the legal issues here is that wardriving is legal and can be beneficial,
but this does not mean that everything a wardriver does can be ethical.
Wardrivers should take the knowledge they gain from doing such task and help
notify people of their vulnerabilities. Having all this information on networks in
a given area brings into some ethical issues that a wardriver must make sure
they follow, because a wardriver has a database of all these vulnerable
networks, it makes it easy for them to get caught into ethical dilemmas. This
information can be both used for good and for bad. The good notifying people of
their vulnerabilities and the bad taking advantage of these networks or selling
information about them to others who might take advantage of this
information. This is each users responsibility to ask themselves, is what I'm
doing ethical. If the answer is no or even shady it is time to stop doing it and


ISE                                   Page                                       DSCE
                                      21
RECOVERY IN MOBILE DATABASE SYSTEM




think about the purpose of wardriving and the effects each wardriver has on
the technology community.

WARDRIVING METHODOLOGY


 THE RIG


A “rig” refers to all of the hardware and software components used while
wardriving. The forum is a valuable resource, especially to new wardrivers,
because they may learn what components are effective and not effective for
wardriving. This forum also allows security professionals to observe how the
activity i s progressing over time and may even assist in recognizing a
wardriver on the road.


COMPUTER SYSTEM


The foundation of every wardriving rig is a computer system. Most wardrivers
choose to use either a laptop or PDA since these devices are relatively light and
portable and they may function on batteries if necessary.        A simple power
inverter may be used with the cigarette lighter adaptor found in most vehicles
to provide power for the entire rig.


The selection of a laptop or PDA will affect your available scanning software
options. An x86-based laptop may utilize software on several Linux and Wi
ndows operating systems. A PowerPC-based laptop will be able to uti lize
software on Mac OS X or Yellow Dog Linux. W ith a Pocket PC PDA, one would
be restricted to software that runs on Familiar Linux or Microsoft Pocket PC,
while Palm OS devices do not have any relevant software availabl e for
wardriving at the moment.


ISE                                    Page                                    DSCE
                                       22
RECOVERY IN MOBILE DATABASE SYSTEM




ISE   Page                               DSCE
      23

More Related Content

What's hot

Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...Léia de Sousa
 
Lecture 1 distriubted computing
Lecture 1 distriubted computingLecture 1 distriubted computing
Lecture 1 distriubted computingARTHURDANIEL12
 
Efficient load aware routing scheme
Efficient load aware routing schemeEfficient load aware routing scheme
Efficient load aware routing schemeambitlick
 
Load aware self organising user-centric dynamic co mp clustering for 5g networks
Load aware self organising user-centric dynamic co mp clustering for 5g networksLoad aware self organising user-centric dynamic co mp clustering for 5g networks
Load aware self organising user-centric dynamic co mp clustering for 5g networksredpel dot com
 
Self-Managed Micro-Containers for Service-Based Applications in the Cloud
Self-Managed Micro-Containers for Service-Based Applications in the CloudSelf-Managed Micro-Containers for Service-Based Applications in the Cloud
Self-Managed Micro-Containers for Service-Based Applications in the CloudMeryem Wannassi
 
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical SystemsA DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systemsijseajournal
 
Machine Learning-Based Prefetch Optimization for Data Center ...
Machine Learning-Based Prefetch Optimization for Data Center ...Machine Learning-Based Prefetch Optimization for Data Center ...
Machine Learning-Based Prefetch Optimization for Data Center ...butest
 
Network share briefing_paper
Network share briefing_paperNetwork share briefing_paper
Network share briefing_paperFethi HATTAB
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Editor IJARCET
 
A framework forselfmanagemented
A framework forselfmanagementedA framework forselfmanagemented
A framework forselfmanagementedPrem Parkash
 

What's hot (18)

Design
DesignDesign
Design
 
Improving DRAM performance
Improving DRAM performanceImproving DRAM performance
Improving DRAM performance
 
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
 
Lecture 1 distriubted computing
Lecture 1 distriubted computingLecture 1 distriubted computing
Lecture 1 distriubted computing
 
Efficient load aware routing scheme
Efficient load aware routing schemeEfficient load aware routing scheme
Efficient load aware routing scheme
 
Load aware self organising user-centric dynamic co mp clustering for 5g networks
Load aware self organising user-centric dynamic co mp clustering for 5g networksLoad aware self organising user-centric dynamic co mp clustering for 5g networks
Load aware self organising user-centric dynamic co mp clustering for 5g networks
 
Amazon SimpleDB
Amazon SimpleDBAmazon SimpleDB
Amazon SimpleDB
 
61
6161
61
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
UNIT 3.docx
UNIT 3.docxUNIT 3.docx
UNIT 3.docx
 
50120140505008
5012014050500850120140505008
50120140505008
 
Self-Managed Micro-Containers for Service-Based Applications in the Cloud
Self-Managed Micro-Containers for Service-Based Applications in the CloudSelf-Managed Micro-Containers for Service-Based Applications in the Cloud
Self-Managed Micro-Containers for Service-Based Applications in the Cloud
 
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical SystemsA DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
 
Dpm 2012
Dpm 2012Dpm 2012
Dpm 2012
 
Machine Learning-Based Prefetch Optimization for Data Center ...
Machine Learning-Based Prefetch Optimization for Data Center ...Machine Learning-Based Prefetch Optimization for Data Center ...
Machine Learning-Based Prefetch Optimization for Data Center ...
 
Network share briefing_paper
Network share briefing_paperNetwork share briefing_paper
Network share briefing_paper
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280
 
A framework forselfmanagemented
A framework forselfmanagementedA framework forselfmanagemented
A framework forselfmanagemented
 

Similar to report on recovery in mobile database system

A STUDY OF RECOVERY OF APPLICATION IN MOBILE WIRELESS ENVIRONMENT USING MOBIL...
A STUDY OF RECOVERY OF APPLICATION IN MOBILE WIRELESS ENVIRONMENT USING MOBIL...A STUDY OF RECOVERY OF APPLICATION IN MOBILE WIRELESS ENVIRONMENT USING MOBIL...
A STUDY OF RECOVERY OF APPLICATION IN MOBILE WIRELESS ENVIRONMENT USING MOBIL...Sruthi kesani
 
Recovery in database system new
Recovery in database system newRecovery in database system new
Recovery in database system newPraveen Pallav
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksJPINFOTECH JAYAPRAKASH
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...IEEEGLOBALSOFTTECHNOLOGIES
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksIEEEFINALYEARPROJECTS
 
Distributed computing ).ppt him
Distributed computing ).ppt himDistributed computing ).ppt him
Distributed computing ).ppt himHimanshu Saini
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...eSAT Publishing House
 
Sdci scalable distributed cache indexing for cache consistency for mobile en...
Sdci  scalable distributed cache indexing for cache consistency for mobile en...Sdci  scalable distributed cache indexing for cache consistency for mobile en...
Sdci scalable distributed cache indexing for cache consistency for mobile en...eSAT Journals
 
H03401049054
H03401049054H03401049054
H03401049054theijes
 
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...cscpconf
 
Task & resource self adaptive
Task & resource self adaptiveTask & resource self adaptive
Task & resource self adaptivecsandit
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemIJSRD
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniquesijcsa
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 
High Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksHigh Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksMário Almeida
 
G munisekhar smaruthu-perumal-269
G munisekhar smaruthu-perumal-269G munisekhar smaruthu-perumal-269
G munisekhar smaruthu-perumal-269Munisekhar Gunapati
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 

Similar to report on recovery in mobile database system (20)

A STUDY OF RECOVERY OF APPLICATION IN MOBILE WIRELESS ENVIRONMENT USING MOBIL...
A STUDY OF RECOVERY OF APPLICATION IN MOBILE WIRELESS ENVIRONMENT USING MOBIL...A STUDY OF RECOVERY OF APPLICATION IN MOBILE WIRELESS ENVIRONMENT USING MOBIL...
A STUDY OF RECOVERY OF APPLICATION IN MOBILE WIRELESS ENVIRONMENT USING MOBIL...
 
Recovery in database system new
Recovery in database system newRecovery in database system new
Recovery in database system new
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
Distributed computing ).ppt him
Distributed computing ).ppt himDistributed computing ).ppt him
Distributed computing ).ppt him
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...
 
Sdci scalable distributed cache indexing for cache consistency for mobile en...
Sdci  scalable distributed cache indexing for cache consistency for mobile en...Sdci  scalable distributed cache indexing for cache consistency for mobile en...
Sdci scalable distributed cache indexing for cache consistency for mobile en...
 
H03401049054
H03401049054H03401049054
H03401049054
 
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
 
Task & resource self adaptive
Task & resource self adaptiveTask & resource self adaptive
Task & resource self adaptive
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management System
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniques
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
High Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksHigh Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing Networks
 
G munisekhar smaruthu-perumal-269
G munisekhar smaruthu-perumal-269G munisekhar smaruthu-perumal-269
G munisekhar smaruthu-perumal-269
 
Blade
BladeBlade
Blade
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

report on recovery in mobile database system

  • 1. RECOVERY IN MOBILE DATABASE SYSTEM TABLE OF CONTENT ABSTRACT INTRODUCTION PREVIOUS WORK SYSTEM MODEL PROBLEM SPECIFICATION METHODOLOGY PROPOSED RECOVERY SCHEME MERITS AND DEMERITS FUTURE ASPECTS CONCLUSION REFERENCES ISE Page 1 DSCE
  • 2. RECOVERY IN MOBILE DATABASE SYSTEM ABSTRACT Mobile computing is a rapidly emerging trend in distributed computing. This new mobile computing environment poses challenging problems in designing fault-tolerant systems because of the dynamics of mobility, and limited bandwidth available on wireless links. Traditional fault-tolerance schemes, therefore, cannot be directly applied to these systems. Mobile systems are often subject to environmental conditions which can cause loss of communication or data. Presented here is a scheme for recovery upon failure of a mobile host. This report portrays the limitations of the mobile wireless environment and improvement over existing recovery scheme is presented which suit the mobile environment. ISE Page 2 DSCE
  • 3. RECOVERY IN MOBILE DATABASE SYSTEM INTRODUCTION The portable computers are fast catching up with the desktop workstations in terms of computing power, memory, display and disk storage. This gives users the information accessing capability regardless of the location. Telecommunication companies are continuously improving the quality, security, availability, and reliability of cellular services and trying to enhance its scope by providing new services like data management capabilities, which is highly desirable. Motivated by such growing demand, an information processing system is referred as the Mobile Database system (MDS). Mobile Database System (MDS), in essence is a distributed client/server database system where the entire processing environment is mobile. The actual database may be static and stored at multiple sites but the data processing nodes, such as laptop, PDA, cell phones, etc., may be mobile and can access desired data to process transactions from anywhere and at any time. In this report the main aim i s to provide a scheme which will help a Mobile Unit (MU) recover efficiently, taking reduced amount of time to recover from its last secure state. In the process a strategy for efficiently managing a unified log for a MU is provided. ISE Page 3 DSCE
  • 4. RECOVERY IN MOBILE DATABASE SYSTEM PREVIOUS WORK  LAZY SCHEMES:- Lazy and Pessimistic schemes (asynchronous schemes) are reported in [8]. In a lazy scheme, logs are stored in the base station (BS) and, if the MU moves to a new BS, a pointer to the old BS is stored in the new BS. Pointers can be used during failure to recover the log distributed over several BS. This scheme has the advantage that it incurs relatively less network overhead during handoff as no log information needs to be transferred. Unfortunately, this scheme has a large recovery time.  PESSIMISTIC SCHEME:- In the pessimistic scheme, the entire log and checkpoint record, if any, are transferred at each handoff. Hence, the recovery is fast but each handoff requires large volume of data transfer.  SCHEMES BASED ON THE MU’S MOVEMENT:- In these schemes, the list of BSs where the log is distributed is transferred during a handoff. This schemes fail when a MU recovers in a BS different than the one in which it crashed.  Distance based:- In the distance-based scheme, log unification is done when the distance covered by MU increases above a predefined value.  Frequency based :- In the frequency-based scheme, log unification is performed when the number of handoffs seen by the MU increases above a predefined value. ISE Page 4 DSCE
  • 5. RECOVERY IN MOBILE DATABASE SYSTEM SYSTEM MODEL Mobile networks have two components, a fixed backbone and a wireless network. There are two distinct sets of entities, namely, mobile hosts and fixed hosts. A host that can move while retaining its network connection is a mobile host. The static network comprises of the fixed hosts and the communication links between them. Some of the fixed hosts, called base stations (BS) are augmented with a wireless interface, and, they provide a gateway for communication between the wireless network and the static network. Due to the limited range of the wireless transceivers, a MU can communicate with a BS only within a limited geographical region around it. This region is referred to as a Cell. The geographical area covered by a cell is a function of the medium used for wireless communication. Due to mobility, the MU may cross the boundary between two cells while being active. Thus, the task of forwarding data between the static network and the mobile host must be transferred to the new cell's BS. This process is known as Handoff. ISE Page 5 DSCE
  • 6. RECOVERY IN MOBILE DATABASE SYSTEM PROBLEM SPECIFICATION MDS recovery process is significantly more complex than conventional systems mainly because of the following unique aspects of Mobile Environment  LOCATION IS NOT FIXED:- As the user moves from one place to another, the location of the MU in the network changes.  DISCONNECTION:- A MU can get disconnected. While disconnected, the mobile host is not able to send or receive any message. Protocols that need to exchange messages will not work correctly in this situation. During disconnection, the checkpoint protocol should provide a local recovery mechanism that allows the MU to recover from its own failures.  BATTERIES HAVE LIMITED POWER:- The MU is often powered by batteries. Network transmissions and disk accesses are the two major power consuming operations. To minimize power consumption, the checkpoint protocol should reduce the amount of information that it adds to the application messages, and it should avoid sending extra messages.  DIFFERENT TYPES OF FAILURES:- MU failure can be separated into two different categories.  Hard Failure:- It includes all failures that can not be repaired; for example, the MU falls and breaks, or is lost or stolen.  Soft Failure:- It does not permanently damage the MU; for example, the battery is discharged and the memory contents are lost, or the operating system crashes. ISE Page 6 DSCE
  • 7. RECOVERY IN MOBILE DATABASE SYSTEM  RANDOM HANDOFF :- MU’s may be subjected to handoff randomly. A handoff may affect recovery mainly because the location of the desired MU may not be immediately available for communication.  WEAK WIRELESS LINK :- The BS and the MU are connected with an unreliable wireless link which is usually slow. ISE Page 7 DSCE
  • 8. RECOVERY IN MOBILE DATABASE SYSTEM METHODOLOGY Recovery is a mechanism to restore an intermediate consistent state of the system which may be useful to avoid loosing all the work performed. Recovery is made possible by maintaining log. Thus, an efficient recovery scheme requires that the log management should be very efficient and must consume minimum system resources and recreate the execution environment as soon as possible after MU reboots. The entire log must be carefully managed to help MU recover from every possible failure in minimum time. Now Depending on the system specifications and requirements, the appropriate recovery and handoff strategy needs to be chosen. There are several factors which affect the recovery:-  FAILURE RATE OF THE HOST:- System failures are caused by defects introduced in manufacturing or by transient or permanent faults occurring during operation.  COMMUNICATION/ MOBILITY RATIO:- Communication refers to the number of messages sent/received by the mobile host and mobility refers to the number of moves the MU makes in a given period of time.  MESSAGE SIZE:- Transmitting and receiving data consumes additional power. In general, transmitting a given amount of data consumes twice as much power as receiving the same amount of data.  MEMORY CONSTRAINTS:- A BS generally has many MUs in its cell. It is necessary to evaluate average memory requirements based on statistical data and the recovery schemes used. ISE Page 8 DSCE
  • 9. RECOVERY IN MOBILE DATABASE SYSTEM  RECOVERY TIME: This is essentially the time required to recover a process upon failure. If the process has hard real-time deadlines, or requires high availability, the recovery upon a failure should be quick. ISE Page 9 DSCE
  • 10. RECOVERY IN MOBILE DATABASE SYSTEM PROPOSED RECOVERY SCHEME In our approach we concentrate on recovering the MU state on its failure at the time of handoff. A region in our approach is a set of all BS controlled by a Mobile Switching Center. Designated Base Station(DBS) is the station where a MU registers itself for first time within a Region. It has following characteristics:- 1. All log activity performed by a MU will be ultimately collected at this DBS 2. In every Region MU will have a different DBS. Concept of Designated Base Station INTER-REGION STRATEGY:- Amongst the region the approach works in a way so as to avoid extra communication steps when MU moves from one region to a new region. In this case MU has some log maintained at DBS in Region1, now when the MU moves to Region 2, the first BS with which MH registers becomes its DBS for new Region say Region 2. So Log will be transferred from Region1 to Region2. ISE Page DSCE 10
  • 11. RECOVERY IN MOBILE DATABASE SYSTEM Region (R)1 Region (R)2 Inter Region Strategy INTRA-REGION STRATEGY  LOG TRANSFER FROM MOBILE CACHE TO BS:- When should MU transfer the entire gathered log to the BS. There are two cases, first of all if suppose MU’s cache is exhausted, immediately entire Log will be copied to current BS. In other case whenever MU moves away from the current BS and system detects Handoff, the MU will copy the entire log to BS and will move to new cell and the log would be appended to the previous Log file. Log appended Log Transfer from Mobile Cache to Base Station ISE Page DSCE 11
  • 12. RECOVERY IN MOBILE DATABASE SYSTEM  LOG MANAGEMENT:- MU carries following information for the purpose of registration- 1. Previous BS identity. 2. DBS identity. 3. Own identity in the form of Connect (MHid, PBSid, DBSid). When any MU registers with a new BS which is not the DBS then the new BS say BS1 informs DBS about its reachability, saying ‘MU is with me’. Now since this message is received by DBS so it won’t do anything, just discard that message. The sequence of messages is shown in the figure below Case 1 of Log Management Now when MU moves from BS1 to BS2, then BS2 informs BS1 about its reachability. After receiving this info BS1 won’t pass delete message to DBS as BS1 knows that previous BS for the MU is DBS where all Log is collected. Now when MU moves further to another BS after handoff, say BS3 then again the same procedure is repeated. BS3 will inform BS2 about MU’s reachability. Then BS2 will send delete message to BS1.After receiving the Delete message BS1 copies the entire log for MU which exists locally over to DBS and after it gets acknowledgement for data transfer it deletes that log entry from local space. ISE Page DSCE 12
  • 13. RECOVERY IN MOBILE DATABASE SYSTEM Now if MU moves back to BS2 from BS3 then:- 1. BS2 informs BS3 about MU’s reachability. 2. BS3 checks if MU’s previous BS i.e. BS2 and its current BS are same. If both the BS are same then: - BS3 won’t send delete message to BS2. - BS3 will append Log to BS2 log. - BS3 will delete its copy of log. - BS2 clears its previous BS identity. - From BS2 MU will continue with original chain of activities. Case 2 of Log Management ISE Page DSCE 13
  • 14. RECOVERY IN MOBILE DATABASE SYSTEM Depending on where the MU recovers, there exist two cases for recovery: Case 1: If MU recovers in same BS where it crashed, then, that MU can use Log stored at that BS to rollback to previous state. If that log is not sufficient, then MU will need Log from its Previous BS. If even that is also not enough, then BS will contact MU’s DBS to restore MU with all its previous state. Case 2: If MU fails in one BS, goes to another BS, and recovers there, then Handoff does not happen and also the new BS does not know about Previous BS identity. In this case the BS in which MU fails notifies DBS about the same and whenever MU tries to recover, the new BS fires query to DBS asking about the log for MU. Case 3 of Log Management ISE Page DSCE 14
  • 15. RECOVERY IN MOBILE DATABASE SYSTEM Case 4 of Log Management ISE Page DSCE 15
  • 16. RECOVERY IN MOBILE DATABASE SYSTEM MERITS AND OF PROPOSED SCHEME  Preceding BS log maintenance gives latest recovery option.  Unification at DBS avoids redundancy of logs.  Loop is tackled.  Auto unification of logs at one site helps:  Quick recovery.  Achieve real time system deadlines.  Didn’t require to traverse a link list DEMERITS OF PROPOSED SCHEME  DBS with many MUs gets overburdened.  Single point of failure. ISE Page DSCE 16
  • 17. RECOVERY IN MOBILE DATABASE SYSTEM FUTURE ASPECTS For more efficient management of recovery information and faster recovery, some other schemes can be employed which uses checkpoints and message logs together in order to guarantee recovery and overcome the cost of storing entire log at one place. The movement- based scheme can also be used which considers Mobile Switching Center as a stable storage which considers both of the failure-free operation cost and the recovery cost. Maintaining entire log at one place in long run may make BS to run out of space so strategies should be developed for Garbage Collection to flush the log at regular intervals. ISE Page DSCE 17
  • 18. RECOVERY IN MOBILE DATABASE SYSTEM CONCLUSION In this paper, an efficient recovery scheme based on message logging for mobile computing systems is presented. The mobile host carrying its recovery information to its current BS can recover instantly in case of a failure. In the proposed approach, the recovery information is not dispersed over a wide range of cells so the recovery cost is not too high. As described in the scheme, while the mobile host moves within a region, recovery information of the mobile host is transferred among the BS of that region. However, if the mobile host moves out of the region, then DBS transfers the recovery information to another region’s DBS. The scheme controls the transfer cost as well as the recovery cost. ISE Page DSCE 18
  • 19. RECOVERY IN MOBILE DATABASE SYSTEM REFERENCES [1] Nuno Neves, W. Kent Fuchs, “Adaptive Recovery for Mobile Environments”, ACM Press, Vol.40, Issue 1, pp. 68 – 74, 1997. [2] Bin Yao, W. Kent Fuchs, Kuo-Feng Ssu. "Message Logging in Mobile Computing", IEEE Twenty-Ninth Annual International Symposium on Fault- Tolerant Computing, 1999. [3] Cris Pedregal Martin, Krithi Ramamritham, “Recovery Guarantees in Mobile Systems”, Proc. of the 1st ACM international workshop on Data Engineering for Wireless and Mobile Access, pp. 22-28, 1999. [4] Cris Pedregal-Martin, Krithi Ramamritham, “Support for Recovery in Mobile Systems”, IEEE Transactions on Computers, v.51 no.10, pp. 1219- 1224, October 2002. [5] Dhiraj K, Pradhan, P. Krishna, Nitin H. Vaidya, “Recoverable Mobile Environments: Design and Trade-off Analysis”, ACM Press, 2001. [6] Taesoon Park, Namyoon Woo, Heon Y. Yeom, “An Efficient Recovery Scheme for Mobile Computing Environment”, ICPADS. [7] Taesoon Park, Namyoon Woo, Heon Y. Yeom,“An Efficient Optimistic Message Logging Scheme for the Recoverable Mobile Computing Systems”, ISAS-SCI (1), 2001. [8] P. Krishna, N. H. Vaidya and D. K. Pradhan, "Recovery in Distributed Mobile Environments", IEEE Workshop on Advances in Parallel and Distributed Systems, 1993. [9] Sashidhar Gadiraju, Vijay Kumar, “Recovery in the Mobile Wireless Environment Using Mobile Agents”, IEEE Transaction on Mobile Computing, Vol. 3, No. 2, pp. 180-191. [10] R. Koo, and S. Toueg,“Checkpointing and Rollback-Recovery for Distributed Systems”,IEEE Trans. Software Eng.,Vol.13,No.1, pp. 23-31, 1987. ISE Page DSCE 19
  • 20. RECOVERY IN MOBILE DATABASE SYSTEM [11] L. Alvisi, and K. Marzullo, “Message Logging: Pessimistic, Optimistic, Causal, and Optimal”, IEEE Trans. Software Eng., Vol. 24, No. 2, pp. 149-159, 1998. [12] H. Higaki, M. Takizawa, “Checkpoint Recovery Protocol for Reliable Mobile Systems”, the 17th IEEE Symposium on Reliable Distributed Systems. [13]CHENG-MIN LIN AND CHYI-REN DOW, “Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems”, Journal of information science and engineering 17, pp. 549-573, 2001. [14] T. Park, N. Woo, H. Yeom, “Efficient Recovery Information Management Schemes for the Fault Tolerant Mobile Computing Systems”, 20th IEEE Symposium on Reliable Distributed Systems (SRDS'01). ISE Page DSCE 20
  • 21. RECOVERY IN MOBILE DATABASE SYSTEM not even use the network's internet connection for Web surfing or other online activities, this is referred to as piggybacking. [2] The idea behind this is to just find the network and see that it exist, but don't connect to it in any way. This will prevent you from breaking the law, because connecting to it is stealing and is illegal by today's laws. Just because as a wardriving you don't mean to connect doesn't mean that it is illegal. This can be a problem with some client adapters that auto connect to the a network whenever it comes into range. This is still illegal to connect to any of there non-public access points without permission. The keys on this part is a wardriver is responsible for the hardware that they choose, so make sure that it is running as expected and don't get caught in a situation where something illegal could be taking place. The main thing with the legal issues here is that wardriving is legal and can be beneficial, but this does not mean that everything a wardriver does can be ethical. Wardrivers should take the knowledge they gain from doing such task and help notify people of their vulnerabilities. Having all this information on networks in a given area brings into some ethical issues that a wardriver must make sure they follow, because a wardriver has a database of all these vulnerable networks, it makes it easy for them to get caught into ethical dilemmas. This information can be both used for good and for bad. The good notifying people of their vulnerabilities and the bad taking advantage of these networks or selling information about them to others who might take advantage of this information. This is each users responsibility to ask themselves, is what I'm doing ethical. If the answer is no or even shady it is time to stop doing it and ISE Page DSCE 21
  • 22. RECOVERY IN MOBILE DATABASE SYSTEM think about the purpose of wardriving and the effects each wardriver has on the technology community. WARDRIVING METHODOLOGY THE RIG A “rig” refers to all of the hardware and software components used while wardriving. The forum is a valuable resource, especially to new wardrivers, because they may learn what components are effective and not effective for wardriving. This forum also allows security professionals to observe how the activity i s progressing over time and may even assist in recognizing a wardriver on the road. COMPUTER SYSTEM The foundation of every wardriving rig is a computer system. Most wardrivers choose to use either a laptop or PDA since these devices are relatively light and portable and they may function on batteries if necessary. A simple power inverter may be used with the cigarette lighter adaptor found in most vehicles to provide power for the entire rig. The selection of a laptop or PDA will affect your available scanning software options. An x86-based laptop may utilize software on several Linux and Wi ndows operating systems. A PowerPC-based laptop will be able to uti lize software on Mac OS X or Yellow Dog Linux. W ith a Pocket PC PDA, one would be restricted to software that runs on Familiar Linux or Microsoft Pocket PC, while Palm OS devices do not have any relevant software availabl e for wardriving at the moment. ISE Page DSCE 22
  • 23. RECOVERY IN MOBILE DATABASE SYSTEM ISE Page DSCE 23