UNIT 3 Mob. Comp.
UNIT 3 Mob. Comp.
Among the wired components, the entire database is distributed, possibly with full or partial
replication.
Among the wired and wireless components, the database is distributed. Among the base stations
or fixed hosts and mobile units, the data management responsibility is shared. Here are some of
the issues which arises in data management of the mobile databases:
1. Mobile database design – Because of the frequent shutdown and for handling the
queries, the global name resolution problem is compounded.
2. Security – The data which is left at the fixed location is more secure as compared to
mobile data. That is mobile data is less secure. Data are also becoming more volatile and
techniques must be able to compensate for its loss. The most important thing needed in
this environment is the authorizing access to critical data and proper techniques.
3. Data distribution and replication – Uneven distribution of data among the mobile units
and the base stations take place here. Higher data availability and low cost of remote
access is there in data distribution and replication. The problem of Cache management is
compounded by the consistency constraints. The most updated data and frequently
accessed data is provided by the Caches to the mobile units. It process their own
transactions. There is most efficient access of data and higher security is available.
4. Replication issues – There is increase of costs for updates and signalling due to increase
in number of replicas. Mobile hosts can move anywhere and anytime.
7. Recovery and fault tolerance – Fault tolerance is the ability of a system to perform its
function correctly even in the presence of internal faults. Faults can be classified in two
types: transient and permanent. Without any apparent intervention, a transient fault will
be eventually disappeared but a permanent fault will remain unless it is removed by some
external agency. The characterization of mobile computing is done by:
Limiting resource availability
Frequent disconnection
High mobility
Low bandwidth
8. Location based service – One of the most challenging tasks which must be undertaken is
determining the location of mobile users, which must be undertaken in order to enable a location
based service. A cache information becomes sale when clients move location dependent.
Eviction techniques are important in this case. Issues that arises in location and services are:
User Privacy
Diverse mobile mapping standards
Market capability
Interoperability
Updation of the location dependent queries and then applying spatial queries to refresh the cache
causes a problem.
9. Query processing – Because of the mobility and rapid resource changes of mobile units,
Query optimization becomes the most complicated. That is query processing is affected when
mobility is considered. There is a need to returned a query response to mobile units that may be
in transit. The cost that affects the most in centralized environments is the input/output.
Communication cost is the most important in distributed environments. It is possible to
formulate location dependent queries.
Data Replication:
Data Replication in mobile computing means the sharing of information to ensure data
consistency between software and hardware resources connected via the internet, to improve
reliability, availability, fault-tolerance, and accessibility of data.
In simpler terms, data replication is the process of storing different copies of the database at
two or more sites in order to improve data availability in less time and at a cheaper cost.
Data replication in mobile computing is a popular fault tolerance technique for distributed
databases.
1. Synchronous Replication
In synchronous replication, the replica of the database is modified immediately after changes
are made in the relation table.
So there is no difference between the original data and the replicated data table.
2. Asynchronous replication
In asynchronous replication, the replica will be modified after commit action is fired on to the
database.
Replication Schemes:=>
The three replication schemes are as follows:
In full replication scheme, the database is available at all the locations to ease the user in the
communication network
It gives high availability of data. In this scheme, the database is available at each location.
It supports faster execution of queries.
2. No Replication:=>
Disadvantages of no replication
3. Partial replication:=>
A partial replication scheme means only part of the or data fragments are replicated.
Recently, under the WAMIS (Wireless Adaptive Mobile Information Systems) and Glomo
ARPA programs several mobile, multimedia, multihop (M3 ) wireless network architectures
have been developed, which require some form of synchronous, time division infrastructure.
The synchronous time frame leads to efficient multimedia support implementations.
However, it introduces more complexity and is less robust in the face of mobility and channel
fading. Clearly there are complexity vs performance tradeoffs in introducing various degrees
of synchronization into the network. Figure 1, shows the cellular model commonly used in
the wireless networks. A, B, C, and D are fixed base stations connected by a wired backbone.
Nodes 1 through 8 are mobile nodes. A mobile node is only one hop away from a base station.
Communications between two mobile nodes must be through fixed base stations and the wired
backbone.
Figure 1: Conventional cellular networks (single-hop)
In parallel with (and separately from) the single hop cellular model, another type of model,
based on radio to radio packet multihopping, has been emerging to serve a growing number of
applications which rely on a fast deployable, wireless infrastructure. The classic examples are
battlefield communications and (in the civilian sector) disaster recovery (fire, earthquake) and
search and rescue. A recent addition to this set is the ‘‘adhoc’’ personal communications
network, which could be rapidly deployed on a campus, for example, to support collaborative
computing and access to the Internet during special events (concerts, festivals etc).
Multihopping through wireless repeaters strategically located on campus permits to reduce
battery power and to increase network capacity. More precisely, by carefully limiting the power
of radios, we conserve battery power. Furthermore, we also cause less interference to other
transmissions further away; this gives the additional benefit of ‘‘spatial reuse’’ of channel
spectrum, thus increasing the capacity of the system. Interestingly, the multihop requirement
may also arise in cellular networks. If a base station fails, a mobile node may not be able to
access the wired network in a single hop. For example, in Figure 2, if base station B fails, node
4 must access base stations A or C through node 2 or node 5 which act as wireless multihop
repeaters.
In order to support multimedia traffic, the wireless network layer must guarantee QoS
(band- width and delay) to real time traffic components. Our approach to provide QoS
to multimedia consists of the following two steps:
12
13 14
11
10 16
20
19 18
Server Replication
The first high-availability mechanism, server replication, allows volumes to have read-write
replicas at more than one server. The set of replication sites for a volume is its volume storage
group (VSG). The subset of a VSG that is currently accessible is a client’s accessible VSG
(AVSG). The performance cost of server replication is kept low by callback-based caching at
clients, and through the use of parallel access protocols. Modifications at a Coda client are
propagated in parallel to all AVSG sites, and eventually to missing VSG sites.
Disconnected Operations in Mobile Computing:=>
Disconnected operations refer to the ability of a mobile computing system to continue
functioning and providing useful services even when network connectivity is temporarily
unavailable. This capability is crucial for maintaining productivity and ensuring data consistency
in environments where network access is intermittent or unreliable. Here’s an overview of
disconnected operations, their challenges, and strategies to manage them:
Key Concepts:
1. Caching:
Data Caching: Before disconnection, relevant data is cached locally on the
mobile device. This ensures that the user has access to necessary information
even without network connectivity.
Write Caching: Changes made to data during disconnection are temporarily
stored locally. Once the device reconnects, these changes are synchronized with
the central server.
2. Replication:
Data Replication: Copies of critical data are replicated on the mobile device. This
ensures that the user can continue to access and modify this data even when
disconnected.
Conflict Resolution: Mechanisms are implemented to handle conflicts that may
arise when changes made during disconnection are synchronized with the
central repository.
3. Synchronization:
Deferred Synchronization: Synchronization of changes made during
disconnection occurs once the device reconnects to the network. Efficient
synchronization protocols are essential to ensure data consistency and integrity.
Bi-directional Synchronization: Ensures that both the mobile device and the
central server are updated with the latest changes once connectivity is restored.
Challenges:
1. Data Consistency:
Ensuring data consistency between the mobile device and the central server is a
significant challenge, particularly when multiple devices might be working on the
same data set.
2. Conflict Resolution:
Conflicts can arise when changes made during disconnection differ from those
made by other users or systems. Effective conflict resolution strategies are
necessary to reconcile these differences.
3. Resource Management:
Mobile devices often have limited resources, such as storage capacity and
battery life. Efficient caching and replication strategies must be implemented to
manage these constraints.
4. Security:
Ensuring the security of cached and replicated data is crucial, especially when
dealing with sensitive information. Encryption and access control measures must
be in place to protect data during disconnection.
Strategies for Managing Disconnected Operations:
1. Optimized Caching:
Implement intelligent caching algorithms that prioritize the caching of frequently
accessed and critical data. This minimizes the impact of disconnection on user
productivity.
2. Efficient Synchronization Protocols:
Use robust synchronization protocols that minimize data transfer overhead and
efficiently handle conflict resolution. Delta synchronization, which transfers only
the changes rather than entire data sets, can be particularly effective.
3. Conflict Detection and Resolution:
Implement automated conflict detection mechanisms that identify discrepancies
between local and central data upon reconnection. Use resolution policies, such
as last-write-wins, user intervention, or versioning, to manage conflicts.
4. User Interface Design:
Design user interfaces that clearly indicate connectivity status and provide
feedback on data synchronization progress. This helps users understand the
state of their data and take appropriate actions if needed.
5. Security Measures:
Ensure that data cached or replicated on the mobile device is encrypted and
protected by strong authentication mechanisms. This safeguards sensitive
information during periods of disconnection.
Examples of Disconnected Operations:
1. Email Clients:
Many email clients allow users to read, write, and delete emails while offline.
These changes are synchronized with the email server once connectivity is
restored.
2. Document Editing:
Applications like Google Docs and Microsoft Office 365 enable users to edit
documents offline. Changes are synced with the cloud once the device
reconnects.
3. Database Access:
Mobile applications that require access to databases often implement local
databases that sync with the central database when connectivity is available.
This ensures continuous access to critical data.
4. File Synchronization Services:
Services like Dropbox and OneDrive provide offline access to files. Users can
work on files offline, and changes are synchronized when the device reconnects
to the internet.