Mobile Databases - PowerPoint PPT Presentation

1 / 44
About This Presentation
Title:

Mobile Databases

Description:

Portable (handheld) computing devices and wireless ... Can access data/resources from anywhere, anytime. Example: IPhone access emails, browse web. ... – PowerPoint PPT presentation

Number of Views:647
Avg rating:3.0/5.0
Slides: 45
Provided by: wni
Category:

less

Transcript and Presenter's Notes

Title: Mobile Databases


1
  • Mobile Databases

2
Outline
  • Introduction
  • Mobile DB Architecture Wiredwireless or MANET.
  • Mobile DB strategies query processing, location
    based services, caching, replication.
  • Mobile data dissemination, mobile security

3
Mobile computing
4
Mobile computing
  • Portable (handheld) computing devices and
    wireless communications (GSM, CDMA, GPRS, 802.11
    a/b/g, WiMax)
  • Can access data/resources from anywhere, anytime
  • Example
  • IPhone access emails, browse web.
  • Location based services, e.g. query gas stations,
    restaurants, hotels, etc.
  • Remote log in your computer from your PDA.
  • Increasing popularity

5
Mobile DB
  • Mobile database data management technology
    enabling use of databases on mobile computing
    environment
  • Data available anywhere independent of
    availability of fixed network
  • Can access public data using internet browser
  • Can access private data through distributed DB
  • Data on mobile and fixed hosts sharable in
    seamless way
  • More complex techniques needed to support this

6
Example of Mobile DB
2 Query Location
3 Answer
4 Answer
1 Query Location Information
Query list the addresses of the gas stations
near me
7
Challenges In Mobile Computing
  • Origins in distributed systems
  • Problems more challenging
  • Asymmetric communication bandwidth
  • Limited and intermittent connectivity
  • Limited life of power supply of mobile units
  • Changing topology of network
  • Mobile database assumes traditional database
    properties, e.g. consistency, atomic

8
Challenges In Mobile ComputingE.g. Handoff issues
9
Outline
  • Introduction
  • Mobile DB Architecture Wiredwireless or MANET.
  • Mobile DB strategies query processing, location
    based services, caching, replication.
  • Mobile data dissemination, mobile security

10
Mobile Computing Architecture
  • Mobile units MU or Mobile Hosts MH
  • Fixed hosts FH on fixed network
  • Base Station BS serves as gateway to fixed and
    wireless network
  • Geographic mobility domain divided into cells
  • Mobile host wireless connection to BS of cell
  • Movement of mobile units unrestricted
  • Must maintain info for access contiguity

11
Mobile Computing Architecture
a wireless cell
12
DB
DB
13
Mobile DB-WiredWireless
  • When Mobile DB mix of fixed and wireless network
  • Fixed FH location, high capacity, reliability,
    low connection cost
  • Wireless support dynamic network topology, low
    capacity, reliability, high connection cost

14
Mobile DB fixed network
  • Suppose all of DB on fixed network, clients are
    mobile
  • How is this different from distributed database
    that is non-mobile?
  • Difficult to maintain sustained connection to
    server
  • Database server typically is stateless,
    especially under broadcast systems
  • Mobile units often cannot maintain a sustained
    network connection

15
Mobile DB-MANET
  • Mobile adhoc networks
  • MUs do not need to communicate via a fixed
    network
  • In MANET, MU responsible for routing own data,
    acting as BS
  • Must be able to handle changes in network topology

16
Example Mobile DB-MANET
Example Battlefield Ad hoc DB information system.
17
Mobile DB-MANET
  • No central control
  • Peer-to-peer P2P
  • Difficult for transaction processing and data
    consistency
  • Example applications
  • Battlefield information sharing
  • Multi-user games
  • Mobile ad-hoc sensor network
  • Disaster relief team communication

18
Outline
  • Introduction
  • Mobile DB Architecture Wiredwireless or MANET.
  • Mobile DB strategies query processing, location
    based services, caching, replication.
  • Mobile data dissemination, mobile security

19
Mobile strategies
  • Provide data cache on mobile host
  • Cache replicas of frequently accessed data
  • Work offline
  • Reduce power consumption
  • Client may be unreachable
  • What if data cached updated during disconnection?

20
Mobile strategies
  • Resources of MU can be limited
  • Mobile hosts personalized
  • Bring in fraction of data need to access
  • MU has low security
  • Mobile DBs high degree of unavailability

21
Mobile Data Management Issues
  • Mobile environment requires new strategies for
  • Querying location dependency
  • Concurrency control ensuring updates consistent
  • Processing transactions
  • Data dissemination
  • Recovery/fault tolerance
  • Security

22
Query processing
  • Queries depend on geographic location, e.g. Get
    addresses of the hotels near me.
  • Query optimization more difficult because of
    mobility and resource changes of MU
  • MU may be in transit or may cross cell boundaries

23
Location-based services
  • Location dependent cache information may become
    stale
  • Frequently updated location dependent queries
  • Apply spatial queries to refresh cache problem

24
Example Cloak scheme by Mokbel
  • The user location is represented as a cloaked
    region that includes the accurate user location
  • K-anonymity there are K users in the cloaked
    region.
  • The area of the cloaked region achieves a
    trade-off between the user privacy and the
    service quality

A cloaked region that provides 4-anonymity
25
Cloak scheme Architecture
2 Query cloaked Spatial Region
3 Answer
Trusted third party that cloaks/anonymizes the
exact location information.
1 Query Location Information
4 Answer
Query list the addresses of the gas stations
near me
26
Caching
  • To compensate for high latency and unreliable
    connectivity
  • Frequently accessed data is cached
  • Can work offline if necessary
  • Dozing energy conserving state, unreachable
    state
  • Can add proxies for unreachable components
  • Proxies keep track of updates to cache

27
Caching Data
Caching Data which data sets should be cached?
To where? When to replace? Objectives reduce
access latency, reduce network transmissions,
increase data availability
28
Data replication
  • Replication strategy answers the questions
  • Who perform replica updates
  • When propagate the replica updates
  • Which sites need updated replicas
  • Replication propagation time synchronous,
    asynchronous.

29
Synchronous Replication
  • Updates are propagated to all sites immediately
  • Locks replicas while updating
  • No inconsistencies are possible so no need for
    reconciliation
  • Reads at connected sites get current data
  • Reads at disconnected sites may get stale data
  • Problems deadlocks, high message overhead,
    impractical for frequently-disconnected net.

30
Asynchronous Replication
  • Propagates replica updates after the updating
    transaction commits.
  • Updates first occur on local data.
  • Other sites update only after transaction
    commits.
  • Problems may read stale replicas.

31
Outline
  • Introduction
  • Mobile DB Architecture Wiredwireless or MANET.
  • Mobile DB strategies query processing, location
    based services, caching, replication.
  • Mobile data dissemination, mobile security

32
Data Dissemination -Broadcasting
  • Assumptions
  • Requests are read-only (Most are)
  • Because of latency, server can handle fewer
    clients in same amount of time
  • Broadcasting acceptable solution
  • Scalable single broadcast of data item can
    satisfy all outstanding requests for data item

33
Data Dissemination -Broadcasting
  • Broadcast-based data dissemination approaches
  • Push-based data broadcasting
  • Pull-based data broadcasting

34
Data Dissemination -Broadcasting
  • How does a mobile client access the database
  • Widely accepted approach is to broadcast the data
    Data on Air

35
Data Dissemination -Broadcasting
  • Data contents within a file or database are
    repeatedly broadcast through the broadcast
    channel
  • channel becomes a disk
  • clients can retrieve data as it goes by
  • expected wait time for a data item is the same

36
Data Dissemination BroadcastingFlat broadcasting
37
Data Dissemination BroadcastingData Disks
  • broadcast data in different frequencies according
    to their relevant importance
  • multi-level memory hierarchy
  • hot data are broadcast more frequently then cold
    data
  • Data with similar access frequency are grouped
    into disks

38
Data Dissemination -Broadcasting
39
Data Dissemination -Broadcasting
  • also called adaptive approaches
  • data items are broadcast on-demand
  • only requested data will appear as data on air
  • How do decide which page to broadcast next?

40
Data Dissemination -Broadcasting
  • Data broadcasting is prioritized according to
    some metrics
  • Most common algorithms are
  • First come Fist Served (FCFS) broadcasts the
    pages in the order they are requested.
  • Most Requests First (MRF) broadcasts the page
    with maximum number of pending requests.
  • Longest Wait First (LWF) selects the page that
    has the largest total waiting time, i.e., the sum
    of the time that all pending request for the item
    have been waiting. (RW is approximation)

41
Security
  • Mobile data less secure than data at fixed
    location
  • Data is more volatile
  • Must manage and authorize access to critical data
  • Not desirable to share data with unauthorized
    users
  • Many security issues not specific to DBSs
  • Peers may need help of unauthorized peers to
    transfer data
  • Encrypt data

42
Example Attacks for Vehicular Network
Localization Services
Fake node E
A
Attacker B
B I am between (E, F)
B I am between (E, F)
Attacker B
Fake node F
C
  • Report wrong locations
  • Fake non-existing nodes

A
  • Impersonate other node

Attacker B
B I am node D
C
43
Recovery and Fault tolerance
  • Site, media, transaction and communication
    failures
  • Voluntary shutdown not a site failure
  • Transaction failures can occur during handoff

44
  • Lei Tang
  • Ph.D. student
  • Research in Mobile Computing
Write a Comment
User Comments (0)
About PowerShow.com