Data Dissemination in Mobile Databases

Author(s):  
Agustinus Borgy Waluyo ◽  
Bala Srinivasan ◽  
David Taniar

The development of wireless technology has led to mobile computing, a new era in data communication and processing (Barbara, 1999; Myers & Beigl, 2003). With this technology, people can now access information anytime and anywhere using a portable, wireless computer powered by battery (e.g., PDAs). These portable computers communicate with a central stationary server via a wireless channel. Mobile computing provides database applications with useful aspects of wireless technology known as mobile databases.

Author(s):  
Agustinus Borgy Waluyo ◽  
Bala Srinivasan ◽  
David Taniar

The development of wireless technology has led to mobile computing, a new era in data communication and processing (Barbara, 1999; Myers & Beigl, 2003). With this technology, people can now access information anytime and anywhere using a portable, wireless computer powered by battery (e.g., PDAs). These portable computers communicate with a central stationary server via a wireless channel. Mobile computing provides database applications with useful aspects of wireless technology known as mobile databases. The main properties of mobile computing include mobility, severe power and storage restriction, frequency of disconnection that is much greater than a traditional network, bandwidth capacity, and asymmetric communications costs. Radio wireless transmission usually requires a greater amount of power as compared with the reception operation (Xu, Zheng, Zhu, & Lee, 2002). Moreover, the life expectancy of a battery (e.g., nickel-cadmium, lithium ion) was estimated to increase time of effective use by only another 15% (Paulson, 2003). Thus, efficient use of energy is definitely one of the main issues. Data dissemination (can also be called data broadcasting) is one way to overcome these limitations. With this mechanism, a mobile client is able to retrieve information without wasting power to transmit a request to the server. Other characteristics of data dissemination include: scalability as it supports a large number of queries; query performance which is not affected by the number of users in a cell as well as the request rate; and effective to a high-degree of overlap in the user’s request. In this article, the terms data dissemination and data broadcasting are used interchangeably. The ultimate challenge in data dissemination is to minimize the response time and tuning time of retrieving database items. Response time is the total of elapsed time required for the data of interest to arrive in the channel and the download time, while tuning time is the amount of time that a client is required to listen to the channel, which is used to indicate its energy consumption. In some cases, the response time is equal to the tuning time. This article describes a state-of-the art development in data dissemination strategies in mobile databases. Several strategies for improving the query performance by disseminating data to a population of mobile users will be explained.


Author(s):  
Z. Abdul-Mehdi ◽  
A. Mamat ◽  
H. Ibrahim ◽  
M. Dirs

Recent advances in wireless communications and computer technology have provided users the opportunity to access information and services regardless of their physical location or movement behavior. In the context of database applications, these mobile users should have the ability to both query and update public, private, and corporate databases. The main goal of mobile software research is to provide as much functionality of network computing as possible within the limits of the mobile computer’s capabilities. Consequently, transaction processing and efficient update techniques for mobile and disconnected operations have been very popular. In this article, we present the main architecture of mobile transactions and the characteristics with a database perspective. Some of the extensive transaction models and transaction processing for mobile computing are discussed with their underlying assumptions. A brief comparison of the models is also included


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Lingling Xu ◽  
Jin Li ◽  
Shaohua Tang ◽  
Joonsang Baek

With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.


2005 ◽  
Vol 1 (4) ◽  
pp. 225-252 ◽  
Author(s):  
Agustinus Borgy Waluyo ◽  
Bala Srinivasan ◽  
David Taniar

The emergence of mobile computing provides the ability to access information at any time and place. However, as mobile computing environments have inherent factors like power, storage, asymmetric communication cost, and bandwidth limitations, efficient query processing and minimum query response time are definitely of great interest. This survey groups a variety of query optimization and processing mechanisms in mobile databases into two main categories, namely: (i) query processing strategy, and (ii) caching management strategy. Query processing includes both pull and push operations (broadcast mechanisms). We further classify push operation into on-demand broadcast and periodic broadcast. Push operation (on-demand broadcast) relates to designing techniques that enable the server to accommodate multiple requests so that the request can be processed efficiently. Push operation (periodic broadcast) corresponds to data dissemination strategies. In this scheme, several techniques to improve the query performance by broadcasting data to a population of mobile users are described. A caching management strategy defines a number of methods for maintaining cached data items in clients' local storage. This strategy considers critical caching issues such as caching granularity, caching coherence strategy and caching replacement policy. Finally, this survey concludes with several open issues relating to mobile query optimization and processing strategy.


2009 ◽  
pp. 1257-1266
Author(s):  
Ziyad Tariq Abdul-Mehdi ◽  
Ali Bin Mamat ◽  
Hamidah Ibrahim ◽  
Mustafa M. Dirs

Recent advances in wireless communications and computer technology have provided users the opportunity to access information and services regardless of their physical location or movement behavior. In the context of database applications, these mobile users should have the ability to both query and update public, private, and corporate databases. The main goal of mobile software research is to provide as much functionality of network computing as possible within the limits of the mobile computer’s capabilities. Consequently, transaction processing and efficient update techniques for mobile and disconnected operations have been very popular. In this article, we present the main architecture of mobile transactions and the characteristics with a database perspective. Some of the extensive transaction models and transaction processing for mobile computing are discussed with their underlying assumptions. A brief comparison of the models is also included.


Author(s):  
John Krogstie

Today, the PC is only one of many ways to access information resources. On one hand, traditional computing technology is becoming more mobile and ubiquitous and, on the other hand, traditional mass media are becoming richer. Whereas information services related to interactive TV and ubiquitous computing are projected to become prominent in a few years, mobile computing is the most important current trend within information and communication technology.


2016 ◽  
Vol 2016 ◽  
pp. 1-12
Author(s):  
Hayoung Oh

Multiple input and multiple output (MIMO) is a well-known technique for the exploitation of the spatial multiplexing (MUX) and spatial diversity (DIV) gains that improve transmission quality and reliability. In this paper, we propose a quality-adaptive scheme for handover and forwarding that supports mobile-video-streaming services in MIMO-capable, heterogeneous wireless-access networks such as those for Wi-Fi and LTE. Unlike previous handover schemes, we propose an appropriate metric for the selection of the wireless technology and the MIMO mode, whereby a new address availability and the wireless-channel quality, both of which are in a new wireless-access network so that the handover and video-playing delays are reduced, are considered. While an MN maintains its original care-of address (oCoA), the video packets destined for the MN are forwarded with the MIMO technique (MUX mode or DIV mode) on top of a specific wireless technology from the previous Access Router (pAR) to the new Access Router (nAR) until they finally reach the MN; however, to guarantee a high video-streaming quality and to limit the video-packet-forwarding hops between the pAR and the nAR, the MN creates a new CoA (nCOA) within the delay threshold of the QoS/quality of experience (QoE) satisfaction result, and then, as much as possible, the video packet is forwarded with the MUX. Through extensive simulations, we show that the proposed scheme is a significant improvement upon the other schemes.


2012 ◽  
Vol 433-440 ◽  
pp. 2237-2243
Author(s):  
Hemalatha Elango ◽  
Karthiyayini Nagarajan

With more number of aged people being diagnosed for Alzheimer’s disease and prevention being the only remedy, the proposed idea helps in continuous monitoring through wireless technology. The Tracking, Monitoring and tele-Diagnosing (TMD) secure system utilises Bluetooth wireless technology. Here the movement pattern of the patient is tracked with the help of Bluetooth enabled handheld device carried by the patient and Bluetooth APs located in each room. This pattern is stored in the data base. To protect the privacy of the patient the collected information is secured through geo-encryption technique before sending via open wireless channel (internet). The remote medical practitioner is able to diagnose whether the target patient is developing Alzheimer’s disease from the received information. Thus, our proposed system provides secured remote diagnosis of the disease in senior people.


2014 ◽  
Vol 621 ◽  
pp. 288-293
Author(s):  
Meng Wang ◽  
Xin Yu Tang ◽  
Wen Xiao Zeng ◽  
Jun Lin Zhou ◽  
Rong Hui Zhang

In view of the development of wireless sensor system data transmission model in mine mechanical, we construct a ground reflection model of double path combined with the actual background demand based on the analysis of the wireless network routing protocol. Firstly, we put forward the selection strategy on wireless communication transmission power of multiple information sensor nodes. To build a data communication mode, we proposed the selection and evaluation method of network parameters based on graph theory. In consideration of the wireless channel model, combined with the initial random layout problem of network node, we explore whether to be neighbors between any two nodes arranged at random and the constraint relationship of wireless communication distance between nodes. Finally, we make up a dynamic routing selection algorithm with a view to dynamic nodes, and conduct the simulation analysis and experiment design. The research results show that with the increase of the random movement speed about network nodes, the process of depleting the energy of the nodes in the wireless sensor network speeds up, which explain the protocol given in the paper requires more energy to cope with the problem that the network topology changes frequently because of the random motion of nodes in network. The research results provide a reference to the wireless network node research and design in the electromechanical integration design.


Sign in / Sign up

Export Citation Format

Share Document