Preview

Mobile Query and Processing in Mobile Database Environment

Satisfactory Essays
Open Document
Open Document
4114 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Query and Processing in Mobile Database Environment
MOBILE QUERY AND PROCESSING IN MOBILE DATABASE ENVIRONMENT Agustinus Borgy Waluyo1
1

Bala Srinivasan1

David Taniar2

School of Computer Science and Software Engineering, Monash University, Australia {Agustinus.Borgy.Waluyo, Bala.Srinivasan}@infotech.monash.edu.au. 2 School of Business Systems, Monash University, Australia David.Taniar@infotech.monash.edu.au

Abstract Mobile database is a new context of database application in wireless environment. It introduces unique type of queries, and query-processing strategies that are different to traditional databases. We classify mobile database query into two categories, especially context-awareness query and adhoc query. Context-awareness query is further classified into location dependent, context dependent, and hybrid query. As for the query processing, we define three strategies namely mobile client, on air, and server strategy. Mobile client and on air strategy relates to caching strategy and broadcast strategy respectively. Finally, we include some challenges in mobile databases.

1. Introduction
Recent advances in wireless technology have led to mobile computing, a new dimension in data communication and processing. Many predict a new emerging, gigantic market with millions of mobile users carrying small, battery-powered terminal equipped with wireless connection [1,2,10]. The mobile computing environment provides database applications with useful aspects of wireless technology, which is known as mobile databases. This advance technology has created a new age of nomadic database users. Basically, these users are simply accessing a database through a network. However, the network is now applied in wireless environment, and has several novel properties, which include user’s locations are constantly changing, the likelihood of losing connections is much greater than in a traditional network, and asymmetric communication environment in which the wireless bandwidth for uplink communication is smaller than



References: 1. 2. 3. 4. 5. 6. 7. 8. 9. ACHARYA S., ALONSO R., FRANKLIN M. AND ZDONIK S., Broadcast Disks: Data Management for Asymmetric Communication Environments, Proceedings of ACM Sigmod, pp.199-210, May, 1995. BARBARA D., Mobile Computing and Databases-A Survey, IEEE TKDE, 11(1):108-117, January/February, 1999. CAI Y. AND HUA K. A., An Adaptive Query Management Technique for Real-Time Monitoring of Spatial Regions in Mobile Database Systems, 21st IEEE IPCCC, pp.259-266, 2002. CHAN B. Y., SI A. and Leong H. V., Cache Management for Mobile Databases: Design and Evaluation, Proceedings of the International Conference on Data Engineering (ICDE), pp.54-63, 1998. CHEN G. AND KOTZ D., A Survey of Context-Aware Mobile Computing Research, Technical Report TR2000381, Department of Computer Science, Dartmouth College, November, 2000. EBLING R.M., HUNT H.D.G. AND LEI H., Issues for Context Services for Pervasive Computing, Proceedings of Middleware’01 Advanced Workshop on Middleware for Mobile Computing, Heidelberg, November, 2001. ELMASRI R. AND NAVATHE S. B., Fundamentals of Database Systems, 3’rd Edition, Addison W., U.S.A., 2000. FRANKLIN J.M., Challenges in Ubiquitous Data Management, Informatics, pp.24-33, 2001. GODFREY P. AND GRYZ J., Semantic Query Caching for Heterogeneous Databases, Proceedings of the 4th Knowledge Representation meets Databases Workshop (KRDB), pp.61-66, April, 1997. 10. IMIELINSKI T. AND VISWANATHAN S., Adaptive Wireless Information Systems, Proceedings of SIGDBS (Special Interest Group in Database Systems) Conference, pp.19-41, October, 1994. 11. IMIELINSKI T., VISWANATHAN S. AND BADRINATH B. R., Data on Air: Organisation and Access, IEEE TKDE, 19(3): 353-371, May/June, 1997. 12. KOTTKAMP H.-E. AND ZUKUNFT O., Location-Aware Query Processing in Mobile Database Systems, ACM Symposium on Applied Computing, pp.416-423, February, 1998. 13. KUBACH U. AND ROTHERMEL K., A Map-Based Hoarding Mechanism for Location-Dependent Information, Proceedings of Second Mobile Data Management (MDM), pp.145-157, January, 2001. 14. SCHILIT B., ADAMS N. AND WANT R., Context-Aware Computing Applications, Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pp. 85-90, December, 1994. 15. WOLFSON O., ET AL, Databases for Tracking Mobile Units in Real Time, Proceedings of ICDT’99, pp. 169186, 1998. 64

You May Also Find These Documents Helpful

  • Best Essays

    Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system.…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Best Essays

    "Field mobility solutions improve information quality, decrease transaction times, break down business barriers and give the competitive advantage - all of which are required component of a successful business" (ibid). Additionally, this technology is fairly easy to integrate with existing platforms and offers easy and quick computing solutions.…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Week 10 Term Paper

    • 3259 Words
    • 10 Pages

    In this term paper, I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to processing server without users having to use a desktop system. Next, I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Following the examination the challenges of developing applications that run on mobile devices because of the small screen size. Then I will describe the methods that can be used to decide which platform to support. Afterward I will discuss ways of providing high availability given that a mobile application requires high availability because of end users needing to have continuous access to IT and IS systems. Last but not least, I will discuss methods of making mobile devices more secure, since mobile devices are subjected to hacking at a higher rate than non-mobile devices.…

    • 3259 Words
    • 10 Pages
    Better Essays
  • Good Essays

    In this currently changing data-thirsty world, people like to access the information regarding family, business, politics, education and social or professional networking in their day-to-day lives. Thus, As-mobile-as-possible wireless access to the internet, intranet or a corporate database.…

    • 877 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Week 10 Term paper

    • 420 Words
    • 2 Pages

    When a business is looking at its online strategy these days, it shouldn’t confine itself to the world of computers. Instead, it needs to be thinking about how it can get into its customers’ pockets. Trends are pointing to the inevitable fact that mobile computing, and the Web site and applications that follow, holds great promises for business. The engine powering the gold rush onto mobile is the promise of geolocation, which is the ability for your phone to relay the information about where you are. The geolocation information in turn makes advertising on your phone smarter, since it can target you on a block-by-block basis. This technology has become one of the most popular trends in social networking giving us the ability to let our friends know where we are, identify popular or convenient places close to our physical location or even remotely check in to restaurants. These types of applications when accessed on a desktop system are bland and less of an experience.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Database Environment

    • 1121 Words
    • 5 Pages

    When building a system for information, you have to decide how much responsibility for data management your software will take. A database can be rather large or it can be small depending on the information that is being stored. Request for information from a database are made in the form of a query or a question asking the database for particular information. All database management systems are not the same from a technical standpoint. They differ mostly in the way they organize their information internally. The internal organization can then determine how quickly and supplely the information can be extracted (Jupitermedia, 2011) .…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Mobile computing and social networks are part of the daily lives of millions of Americans. “48% of American adults own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking at a higher rate than non-mobile devices, methods of making mobile devices more secure will be examined.…

    • 3631 Words
    • 15 Pages
    Better Essays
  • Powerful Essays

    Storing Information: enhancing databases system to assist Tesco Mobile Phones have a bigger space for data storage. With the dominance of technology, Tesco Mobile has extra choices of storage from flash memory to network area storage. The ultimate solution is that Tesco Mobile may construct a single data warehouse where they can put all the necessary data about customers, suppliers, and financial companies. Every employee should have a personal ID to access the data not having the use of operational systems. To be able to succeed, Tesco Mobile has to fund or invest the highest speed network access to help database system work properly.…

    • 1202 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Wormhole

    • 9395 Words
    • 38 Pages

    Mo Li (M’06) received the B.S. degree in computer science and technology from Tsinghua University, Beijing, China, in 2004, and the Ph.D. degree in computer science and engineering from Hong Kong University of Science and Technology, Hong Kong, in 2009. He is a Nanyang Assistant Professor with the Computer Science Division, School of Computer Engineering, Nanyang Technological University, Singapore. His research interests include distributed systems, wireless sensor networks, pervasive computing and RFID, and wireless and mobile systems.…

    • 9395 Words
    • 38 Pages
    Powerful Essays
  • Powerful Essays

    Pervasive Computing

    • 1762 Words
    • 8 Pages

    References: • Diane J. Cook, Sajal K. Das, How smart are our environments? An updated look at the state of the art., Retrieved from Science Direct, December 21, 2006.…

    • 1762 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    Nosql

    • 3386 Words
    • 14 Pages

    This chapter will discuss Not Only SQL (NOSQL) technologies in general, compares different NOSQL databases, discusses the limitations with Relational Database Management Systems (RDBMS), and gives an understanding of how different databases behave for different variants with different amounts of data in the database. This will lay a foundation for the thesis in general and will evaluate some of the related work in this context.…

    • 3386 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Mca Mc0081 Solved Assignment

    • 3556 Words
    • 15 Pages

    The most popular data access scenario in the Internet is the one in which a user must locate a collection of data and iterate through this data a single time.…

    • 3556 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    The idea is that instead of having one, centralized database, we are going to spread the data out among the cities on the distributed network, each of which has its own computer and data storage facilities. All of this distributed data is still considered to be a single logical database. When a person or process anywhere on the distributed network queries the database, it is not necessary to know where on the network the data being sought is located. The user just issues the query, and the result is returned. This feature is known as location transparency. This can become rather complex very quickly, and it must be managed by sophisticated software known as a distributed database management system or distributed DBMS.…

    • 1554 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Brief History of Databases

    • 1758 Words
    • 8 Pages

    of multiple types of end users. The data is stored in one location so that they…

    • 1758 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Oracle Features

    • 6482 Words
    • 26 Pages

    The main use of the Oracle database system is to store and retrieve data for applications. The features of the Oracle database and related products described in this section are used to create applications. We’ve divided the discussion in this section into…

    • 6482 Words
    • 26 Pages
    Good Essays