A locking model for mobile databases in mobile environments

被引:0
|
作者
Le, HN [1 ]
Nygård, M [1 ]
Ramampiaro, H [1 ]
机构
[1] NTNU, Dept Comp & Informat Sci, NO-7491 Trondheim, Norway
关键词
locking protocol; mobile databases; mobile environments;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Frequent and unpredictable disconnection of communication may cause database operations that are executed in mobile environments to be delayed. A shared data object that is locked at a disconnected mobile host could obstruct operations of other connected hosts. In this paper, we discuss a locking model for mobile databases to deal with this challenge. The objective of the locking model is higher throughput of mobility supporting systems. As explained in this paper, this is achieved as follows. First, a requested lock from a mobile host can compete with existing locks on a specific data item. Second, a write lock request can gain control over read locks and an online lock request can take over offline locks. The approach of the lock model is that data downloaded into the mobile devices with intended modification. It is only write-locked when the actual operations on it are being executed. The locking model, in addition. supports cooperative operations and increases awareness in mobile working environments.
引用
下载
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [31] Context-Aware Prediction Model for Offloading Mobile Application Tasks to Mobile Cloud Environments
    Jadad, Hamid A.
    Touzene, Abederezak
    Day, Khaled
    Alziedi, Nasser
    Arafeh, Bassel
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (03) : 58 - 74
  • [32] Performance Evaluation of Mobile Applications in Mobile Cloud Environments
    Santana, N. A.
    Lins, F. A. A.
    Sousa, E. T. G.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (11) : 4597 - 4602
  • [33] Clustering mobile trajectories for resource allocation in mobile environments
    Katsaros, D
    Nanopoulos, A
    Karakaya, M
    Yavas, G
    Ulusoy, Ö
    Manolopoulos, Y
    ADVANCES IN INTELLIGENT DATA ANALYSIS V, 2003, 2810 : 319 - 329
  • [34] Mobile Processes: Enhancing Cooperation in Distributed Mobile Environments
    Kunze, Christian P.
    Zaplata, Sonja
    Lamersdorf, Winfried
    JOURNAL OF COMPUTERS, 2007, 2 (01) : 1 - 11
  • [35] Effective balance of mobile education clients in mobile environments
    Wang, C.-S. (cswang@email.au.edu.tw), 1600, Computer Society of the Republic of China (23):
  • [36] Active mobile database systems for mobile computing environments
    Murase, T
    Tsukamoto, M
    Nishio, S
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1998, E81D (05) : 427 - 433
  • [37] Checking the integrity constraints of mobile databases with Three-Level model
    Ibrahim, Hamidah
    Dzolkhifli, Zarina
    Madiraju, Praveen
    SHARING DATA, INFORMATION AND KNOWLEDGE, PROCEEDINGS, 2008, 5071 : 185 - +
  • [38] An Invalidation Cache Model Based on Ant Colony Algorithm in Mobile Databases
    Chu, Yan
    Zhang, Jianpei
    Yang, Jing
    ICICSE: 2008 INTERNATIONAL CONFERENCE ON INTERNET COMPUTING IN SCIENCE AND ENGINEERING, PROCEEDINGS, 2008, : 27 - 30
  • [39] An optimal invalidation method for mobile databases
    Hou, WC
    Zhang, HY
    Su, M
    Wang, H
    INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATION TECHNOLOGIES : EXPLORING EMERGING TECHNOLOGIES, 2001, : 317 - 331
  • [40] Mobile access to biological databases on the Internet
    Riikonen, P
    Boberg, J
    Salakoski, T
    Vihinen, M
    IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2002, 49 (12) : 1477 - 1479