A locking model for mobile databases in mobile environments

被引:0
|
作者
Le, HN [1 ]
Nygård, M [1 ]
Ramampiaro, H [1 ]
机构
[1] NTNU, Dept Comp & Informat Sci, NO-7491 Trondheim, Norway
关键词
locking protocol; mobile databases; mobile environments;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Frequent and unpredictable disconnection of communication may cause database operations that are executed in mobile environments to be delayed. A shared data object that is locked at a disconnected mobile host could obstruct operations of other connected hosts. In this paper, we discuss a locking model for mobile databases to deal with this challenge. The objective of the locking model is higher throughput of mobility supporting systems. As explained in this paper, this is achieved as follows. First, a requested lock from a mobile host can compete with existing locks on a specific data item. Second, a write lock request can gain control over read locks and an online lock request can take over offline locks. The approach of the lock model is that data downloaded into the mobile devices with intended modification. It is only write-locked when the actual operations on it are being executed. The locking model, in addition. supports cooperative operations and increases awareness in mobile working environments.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [1] Sharing mobile databases in dynamically configurable environments
    Brayner, A
    Aguiar, JM
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2003, 2681 : 724 - 737
  • [2] Control of databases in mobile distributed computing environments
    Kim, SH
    Kim, JH
    Bae, HY
    Kim, JH
    Kim, JH
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT II, 2002, : 521 - 525
  • [3] A model for transaction management in mobile databases
    Abdul-Mehdi Z.T.
    Bin Mamat A.
    Ibrahim H.
    Deris M.M.
    [J]. IEEE Potentials, 2010, 29 (03): : 32 - 39
  • [4] A Model for Checking the Integrity Constraints of Mobile Databases
    Ibrahim, Hamidah
    Dzolkhiflil, Zarina
    Madiraju, Praveen
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008 WORKSHOPS, 2008, 5333 : 548 - +
  • [5] Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs
    Han, Byung-Jin
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    [J]. CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 123 - 135
  • [6] An adaptive object management algorithm for distributed databases in mobile computing environments
    Lin, WJ
    Veeravalli, B
    [J]. ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1665 - 1669
  • [7] Fragmentation of mobile databases
    Barbar, AM
    Karam, JM
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 218 - 222
  • [8] Summarisation for mobile databases
    Chan, D
    Roddick, JF
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2005, 37 (03): : 267 - 284
  • [9] Security Management Model for Mobile Databases Transaction Management
    Abdul-Mehdi, Ziyad. T.
    Mahmod, Ramlan
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 1257 - +
  • [10] Adaptive Valid Period Based Concurrency Control without Locking in Mobile Environments
    Nizamuddin, Mohammed Khaja
    Sattar, Syed Abdul
    [J]. RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 349 - +