Presentation is loading. Please wait.

Presentation is loading. Please wait.

Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra.

Similar presentations


Presentation on theme: "Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra."— Presentation transcript:

1 Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra

2 Introduction Mobile database system in a way is a system where the actual database is stored at one or multiple locations, but the processing units like laptop, PDA, cell phones are mobile. Mobile database system in a way is a system where the actual database is stored at one or multiple locations, but the processing units like laptop, PDA, cell phones are mobile. In case of failure, the recovery of the Mobile Database Systems is far more complex than the recovery of the traditional database systems. In case of failure, the recovery of the Mobile Database Systems is far more complex than the recovery of the traditional database systems.

3 Factors that affect the recovery: Geographical Movement Geographical Movement Disconnection Disconnection Limited life of batteries Limited life of batteries The mobile device might also break, fall, gets lost, or stolen The mobile device might also break, fall, gets lost, or stolen Bad connection areas Bad connection areas Network issues like the weakness of wireless link Network issues like the weakness of wireless link

4 Recovery schemes Overview of the traditional recovery schemes as well as one of the new recovery schemes Overview of the traditional recovery schemes as well as one of the new recovery schemes Compares the two, listing the advantages and disadvantages of the schemes Compares the two, listing the advantages and disadvantages of the schemes My opinion is that the new recovery scheme is more efficient to use in mobile databases My opinion is that the new recovery scheme is more efficient to use in mobile databases

5 Traditional Schemes Two main examples are: Two main examples are: lazy scheme lazy scheme The pessimistic scheme The pessimistic scheme The Lazy scheme: The Lazy scheme: The lazy scheme uses the idea of pointers in the recovery process. The lazy scheme uses the idea of pointers in the recovery process. The logs or the changes made to the data and the recovery information are stored in base stations. The logs or the changes made to the data and the recovery information are stored in base stations.

6 The lazy scheme When the mobile node moves from one base station to another, only the pointer is stored in the new base station to refer to the old one. When the mobile node moves from one base station to another, only the pointer is stored in the new base station to refer to the old one. Advantage: there is very low overhead on the network. Advantage: there is very low overhead on the network. Disadvantages: Disadvantages: The large recovery time it needs The large recovery time it needs More cost and missing deadlines. More cost and missing deadlines.

7 Pessimistic scheme The whole log information is transferred from one base station to another. The whole log information is transferred from one base station to another. Advantage: Advantage: It is fast It is fast Disadvantage: Disadvantage: It requires a lot of data transfer It requires a lot of data transfer

8 Traditional schemes The traditional schemes assume that the mobile unit is going to recover in the same base station that it was crashed in. The traditional schemes assume that the mobile unit is going to recover in the same base station that it was crashed in. The traditional schemes do not consider the highly dynamic environments such as the mobile database system. The traditional schemes do not consider the highly dynamic environments such as the mobile database system.

9 Traditional schemes There are other traditional schemes that fall between the lazy and pessimistic approaches. There are other traditional schemes that fall between the lazy and pessimistic approaches. They have similar advantages and disadvantages. They have similar advantages and disadvantages.

10 Factors that affect recovery Failure of the host. Failure of the host. how much the mobile device moves in a given time. how much the mobile device moves in a given time. much information it needs to communicate with the host. much information it needs to communicate with the host. the size of the message transmitted. the size of the message transmitted. message gets bigger, it needs additional power message gets bigger, it needs additional power

11 Factors that affect recovery Receiving a message is also different than transmitting a message. Receiving a message is also different than transmitting a message. The memory issue The memory issue Because a lot of mobile devices are related to the same base station, the memory of the base station becomes an issue trying to save all the recovery information for all the mobile devices. Because a lot of mobile devices are related to the same base station, the memory of the base station becomes an issue trying to save all the recovery information for all the mobile devices. Recovery time. Recovery time.

12 New scheme States that a good recovery method is a method that concentrates on the management and maintenance of the changes made to the data. States that a good recovery method is a method that concentrates on the management and maintenance of the changes made to the data. Concentrates on the recovery of the mobile unit at the time of handoff. Concentrates on the recovery of the mobile unit at the time of handoff. The changes made to data should be managed to help recover the mobile unit when it fails. The changes made to data should be managed to help recover the mobile unit when it fails.

13 New scheme The new system groups together a set of base stations and calls that a region. The new system groups together a set of base stations and calls that a region. The new system uses the term designated Base Station (DBS) to refer to a station where the mobile node registers itself with at the first time in a particular region. The new system uses the term designated Base Station (DBS) to refer to a station where the mobile node registers itself with at the first time in a particular region.

14 New scheme Changes made to data by a particular mobile device are stored on that DBS. Changes made to data by a particular mobile device are stored on that DBS. When the mobile unit moves from one region to another, it gets a new DBS. When the mobile unit moves from one region to another, it gets a new DBS. The changes made to data will then be transferred from the old DBS to the new DBS. The changes made to data will then be transferred from the old DBS to the new DBS.

15 New scheme The new system also requires that the data should be transferred from the cache of the mobile device itself to its DBS. The new system also requires that the data should be transferred from the cache of the mobile device itself to its DBS. The new system makes sure that the mobile device has its own identity, the identity of the old base station and the identity of the DBS The new system makes sure that the mobile device has its own identity, the identity of the old base station and the identity of the DBS

16 New scheme The new system basically considers two situations for recovery. The new system basically considers two situations for recovery. The first situation is when the mobile device recovers in the same BS where it crashed. The first situation is when the mobile device recovers in the same BS where it crashed. The second situation is the big advantage that the new system has over the traditional ones. The second situation is the big advantage that the new system has over the traditional ones.

17 New scheme First situation: the mobile device uses the data and changes to data on that base station to recover. First situation: the mobile device uses the data and changes to data on that base station to recover. Second situation: Second situation: If the mobile device fails in one base station and then moves to a new base station and try to recover there, then identity of the old base station is not known to the new base station. If the mobile device fails in one base station and then moves to a new base station and try to recover there, then identity of the old base station is not known to the new base station.

18 New scheme The old base station notifies the DBS about the data of the mobile device. The old base station notifies the DBS about the data of the mobile device. The new base station then sends a query to the DBS for information about the mobile device and the data that was on it. The new base station then sends a query to the DBS for information about the mobile device and the data that was on it.

19 Advantages of new scheme Maintaining the data on the previous base station so that there is an updated version incase of recovery. Maintaining the data on the previous base station so that there is an updated version incase of recovery. It avoids multiple copies of data by deleting a copy when the data gets transferred to the DBS. It avoids multiple copies of data by deleting a copy when the data gets transferred to the DBS. the data gets saved at one central place for fast recovery which reduces the recovery time the data gets saved at one central place for fast recovery which reduces the recovery time

20 Disadvantage of new scheme a lot of the base stations have the same DBS which means that the data will be stored on one DBS that gets overloaded sometimes. a lot of the base stations have the same DBS which means that the data will be stored on one DBS that gets overloaded sometimes.

21 Conclusion the recovery process in mobile databases is more complex than the recovery in traditional databases. the recovery process in mobile databases is more complex than the recovery in traditional databases. Two of the main examples on traditional schemes are the lazy and pessimistic approaches. Two of the main examples on traditional schemes are the lazy and pessimistic approaches.

22 Conclusion Some of the disadvantages that the traditional schemes have are high cost, large recovery time, or large data transfer. Some of the disadvantages that the traditional schemes have are high cost, large recovery time, or large data transfer. In my opinion and after the comparison, the new scheme is a better scheme. In my opinion and after the comparison, the new scheme is a better scheme. the mobile node can recover instantly in case of failure. the mobile node can recover instantly in case of failure.

23 Resources Ruchika Dua, Saurabh Bhandari, Recovery in Mobile Database System, International Conference on Wireless and Mobile Communications (ICWMC'06), July 2006 Ruchika Dua, Saurabh Bhandari, Recovery in Mobile Database System, International Conference on Wireless and Mobile Communications (ICWMC'06), July 2006International Conference on Wireless and Mobile Communications (ICWMC'06)International Conference on Wireless and Mobile Communications (ICWMC'06) Sashidhar Gadiraju, Vijay Kumar, Recovery in the Mobile Wireless Environment Using Mobile Agents, IEEE Transactions on Mobile Computing, April 2004 Sashidhar Gadiraju, Vijay Kumar, Recovery in the Mobile Wireless Environment Using Mobile Agents, IEEE Transactions on Mobile Computing, April 2004 IEEE Transactions on Mobile Computing, IEEE Transactions on Mobile Computing, Taesoon Park, Namyoon Woo, Heon Y. Yeom, An Efficient Recovery Scheme for Mobile Computing Environments, Eighth International Conference on Parallel and Distributed Systems (ICPADS'01), June 2001 Taesoon Park, Namyoon Woo, Heon Y. Yeom, An Efficient Recovery Scheme for Mobile Computing Environments, Eighth International Conference on Parallel and Distributed Systems (ICPADS'01), June 2001Eighth International Conference on Parallel and Distributed Systems (ICPADS'01) Eighth International Conference on Parallel and Distributed Systems (ICPADS'01) T. Park, N. Woo, H. Yeom, Efficient Recovery Information Management Schemes for the Fault Tolerant Mobile Computing Systems, 20th IEEE Symposium on Reliable Distributed Systems (SRDS'01), October 2001 T. Park, N. Woo, H. Yeom, Efficient Recovery Information Management Schemes for the Fault Tolerant Mobile Computing Systems, 20th IEEE Symposium on Reliable Distributed Systems (SRDS'01), October 200120th IEEE Symposium on Reliable Distributed Systems (SRDS'01)20th IEEE Symposium on Reliable Distributed Systems (SRDS'01)

24 Questions?


Download ppt "Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra."

Similar presentations


Ads by Google