Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

1 Improving TCP Performance over Mobile Networks HALA ELAARAG Stetson University Speaker : Aron ACM Computing Surveys 2002.
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
System Area Network Abhiram Shandilya 12/06/01. Overview Introduction to System Area Networks SAN Design and Examples SAN Applications.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
Database Replication techniques: a Three Parameter Classification Authors : Database Replication techniques: a Three Parameter Classification Authors :
Node-level Representation and System Support for Network Programming Jaein Jeong.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
William Stallings Data and Computer Communications 7th Edition
1 ICS 214B: Transaction Processing and Distributed Data Management Replication Techniques.
Overview Distributed vs. decentralized Why distributed databases
Two Techniques For Improving Distributed Database Performance ICS 214B Presentation Ambarish Dey Vasanth Venkatachalam March 18, 2004.
16: Distributed Systems1 DISTRIBUTED SYSTEM STRUCTURES NETWORK OPERATING SYSTEMS The users are aware of the physical structure of the network. Each site.
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
Database System Concepts ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Remote Backup Systems.
SM3121 Software Technology Mark Green School of Creative Media.
Recovery Techniques in Distributed Databases Naveen Jones December 5, 2011.
CIS 725 Wireless networks. Low bandwidth High error rates.
1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng.
Spring 2000Nitin BahadurAdvanced Computer Networks A Comparison of Mechanisms for Improving TCP Performance over Wireless Links By: Hari B., Venkata P.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
Mobile Communications: Mobile Transport Layer Mobile Communications Chapter 10: Mobile Transport Layer  Motivation  TCP-mechanisms  Indirect TCP  Snooping.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Obile etworking M-TCP : TCP for Mobile Cellular Networks Kevin Brown and Suresh Singh Department of Computer Science Univ. of South Carolina.
Distributed File Systems Overview  A file system is an abstract data type – an abstraction of a storage device.  A distributed file system is available.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Recovery System By Dr.S.Sridhar, Ph.D.(JNUD), RACI(Paris, NICE), RMR(USA), RZFM(Germany) DIRECTOR ARUNAI ENGINEERING COLLEGE TIRUVANNAMALAI.
Locating Mobile Agents in Distributed Computing Environment.
G063 - Distributed Databases. Learning Objectives: By the end of this topic you should be able to: explain how databases may be stored in more than one.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Location Management in PCS Networks Report of Dissertation By Manikanta Velaga (Adm. No ) Sanjoy Mondal (Adm. No ) M.Tech (CA)
ISADS'03 Message Logging and Recovery in Wireless CORBA Using Access Bridge Michael R. Lyu The Chinese Univ. of Hong Kong
DIST: A Distributed Spatio-temporal Index Structure for Sensor Networks Anand Meka and Ambuj Singh UCSB, 2005.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
Distributed Databases
1 Distributed Databases BUAD/American University Distributed Databases.
Fault Tolerance in CORBA and Wireless CORBA Chen Xinyu 18/9/2002.
1 Recovery in the Mobile Wireless Environment Using Mobile Agents S. Gadiraju, V. Kumar Presented by Yamin Yu.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Topic Distributed DBMS Database Management Systems Fall 2012 Presented by: Osama Ben Omran.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
An Efficient Quorum-based Fault- Tolerant Approach for Mobility Agents in Wireless Mobile Networks Yeong-Sheng Chen Chien-Hsun Chen Hua-Yin Fang Department.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
 Distributed Database Concepts  Parallel Vs Distributed Technology  Advantages  Additional Functions  Distribution Database Design  Data Fragmentation.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
Antidio Viguria Ann Krueger A Nonblocking Quorum Consensus Protocol for Replicated Data Divyakant Agrawal and Arthur J. Bernstein Paper Presentation: Dependable.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
GPFS: A Shared-Disk File System for Large Computing Clusters Frank Schmuck & Roger Haskin IBM Almaden Research Center.
FTOP: A library for fault tolerance in a cluster R. Badrinath Rakesh Gupta Nisheeth Shrivastava.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Computer Networks Part 2
Chapter 1 : Computer Networks. Lecture 1. Introduction to computer networks: Network definition : A network is a collection of computers and other devices.
PERFORMANCE MANAGEMENT IMPROVING PERFORMANCE TECHNIQUES Network management system 1.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Data and Computer Communications Chapter 7 Circuit Switching and Packet Switching.
Remote Backup Systems.
Chapter 25: Advanced Data Types and New Applications
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT -Sumanth Kandagatla Instructor: Prof. Yanqing Zhang Advanced Operating Systems (CSC 8320)
CSE 4340/5349 Mobile Systems Engineering
UNIT IV RAID.
Computer communications
TCP for Wireless Networks
Indexing 4/11/2019.
Remote Backup Systems.
Brahim Ayari, Abdelmajid Khelil and Neeraj Suri
Presentation transcript:

Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra

Introduction Mobile database system in a way is a system where the actual database is stored at one or multiple locations, but the processing units like laptop, PDA, cell phones are mobile. Mobile database system in a way is a system where the actual database is stored at one or multiple locations, but the processing units like laptop, PDA, cell phones are mobile. In case of failure, the recovery of the Mobile Database Systems is far more complex than the recovery of the traditional database systems. In case of failure, the recovery of the Mobile Database Systems is far more complex than the recovery of the traditional database systems.

Factors that affect the recovery: Geographical Movement Geographical Movement Disconnection Disconnection Limited life of batteries Limited life of batteries The mobile device might also break, fall, gets lost, or stolen The mobile device might also break, fall, gets lost, or stolen Bad connection areas Bad connection areas Network issues like the weakness of wireless link Network issues like the weakness of wireless link

Recovery schemes Overview of the traditional recovery schemes as well as one of the new recovery schemes Overview of the traditional recovery schemes as well as one of the new recovery schemes Compares the two, listing the advantages and disadvantages of the schemes Compares the two, listing the advantages and disadvantages of the schemes My opinion is that the new recovery scheme is more efficient to use in mobile databases My opinion is that the new recovery scheme is more efficient to use in mobile databases

Traditional Schemes Two main examples are: Two main examples are: lazy scheme lazy scheme The pessimistic scheme The pessimistic scheme The Lazy scheme: The Lazy scheme: The lazy scheme uses the idea of pointers in the recovery process. The lazy scheme uses the idea of pointers in the recovery process. The logs or the changes made to the data and the recovery information are stored in base stations. The logs or the changes made to the data and the recovery information are stored in base stations.

The lazy scheme When the mobile node moves from one base station to another, only the pointer is stored in the new base station to refer to the old one. When the mobile node moves from one base station to another, only the pointer is stored in the new base station to refer to the old one. Advantage: there is very low overhead on the network. Advantage: there is very low overhead on the network. Disadvantages: Disadvantages: The large recovery time it needs The large recovery time it needs More cost and missing deadlines. More cost and missing deadlines.

Pessimistic scheme The whole log information is transferred from one base station to another. The whole log information is transferred from one base station to another. Advantage: Advantage: It is fast It is fast Disadvantage: Disadvantage: It requires a lot of data transfer It requires a lot of data transfer

Traditional schemes The traditional schemes assume that the mobile unit is going to recover in the same base station that it was crashed in. The traditional schemes assume that the mobile unit is going to recover in the same base station that it was crashed in. The traditional schemes do not consider the highly dynamic environments such as the mobile database system. The traditional schemes do not consider the highly dynamic environments such as the mobile database system.

Traditional schemes There are other traditional schemes that fall between the lazy and pessimistic approaches. There are other traditional schemes that fall between the lazy and pessimistic approaches. They have similar advantages and disadvantages. They have similar advantages and disadvantages.

Factors that affect recovery Failure of the host. Failure of the host. how much the mobile device moves in a given time. how much the mobile device moves in a given time. much information it needs to communicate with the host. much information it needs to communicate with the host. the size of the message transmitted. the size of the message transmitted. message gets bigger, it needs additional power message gets bigger, it needs additional power

Factors that affect recovery Receiving a message is also different than transmitting a message. Receiving a message is also different than transmitting a message. The memory issue The memory issue Because a lot of mobile devices are related to the same base station, the memory of the base station becomes an issue trying to save all the recovery information for all the mobile devices. Because a lot of mobile devices are related to the same base station, the memory of the base station becomes an issue trying to save all the recovery information for all the mobile devices. Recovery time. Recovery time.

New scheme States that a good recovery method is a method that concentrates on the management and maintenance of the changes made to the data. States that a good recovery method is a method that concentrates on the management and maintenance of the changes made to the data. Concentrates on the recovery of the mobile unit at the time of handoff. Concentrates on the recovery of the mobile unit at the time of handoff. The changes made to data should be managed to help recover the mobile unit when it fails. The changes made to data should be managed to help recover the mobile unit when it fails.

New scheme The new system groups together a set of base stations and calls that a region. The new system groups together a set of base stations and calls that a region. The new system uses the term designated Base Station (DBS) to refer to a station where the mobile node registers itself with at the first time in a particular region. The new system uses the term designated Base Station (DBS) to refer to a station where the mobile node registers itself with at the first time in a particular region.

New scheme Changes made to data by a particular mobile device are stored on that DBS. Changes made to data by a particular mobile device are stored on that DBS. When the mobile unit moves from one region to another, it gets a new DBS. When the mobile unit moves from one region to another, it gets a new DBS. The changes made to data will then be transferred from the old DBS to the new DBS. The changes made to data will then be transferred from the old DBS to the new DBS.

New scheme The new system also requires that the data should be transferred from the cache of the mobile device itself to its DBS. The new system also requires that the data should be transferred from the cache of the mobile device itself to its DBS. The new system makes sure that the mobile device has its own identity, the identity of the old base station and the identity of the DBS The new system makes sure that the mobile device has its own identity, the identity of the old base station and the identity of the DBS

New scheme The new system basically considers two situations for recovery. The new system basically considers two situations for recovery. The first situation is when the mobile device recovers in the same BS where it crashed. The first situation is when the mobile device recovers in the same BS where it crashed. The second situation is the big advantage that the new system has over the traditional ones. The second situation is the big advantage that the new system has over the traditional ones.

New scheme First situation: the mobile device uses the data and changes to data on that base station to recover. First situation: the mobile device uses the data and changes to data on that base station to recover. Second situation: Second situation: If the mobile device fails in one base station and then moves to a new base station and try to recover there, then identity of the old base station is not known to the new base station. If the mobile device fails in one base station and then moves to a new base station and try to recover there, then identity of the old base station is not known to the new base station.

New scheme The old base station notifies the DBS about the data of the mobile device. The old base station notifies the DBS about the data of the mobile device. The new base station then sends a query to the DBS for information about the mobile device and the data that was on it. The new base station then sends a query to the DBS for information about the mobile device and the data that was on it.

Advantages of new scheme Maintaining the data on the previous base station so that there is an updated version incase of recovery. Maintaining the data on the previous base station so that there is an updated version incase of recovery. It avoids multiple copies of data by deleting a copy when the data gets transferred to the DBS. It avoids multiple copies of data by deleting a copy when the data gets transferred to the DBS. the data gets saved at one central place for fast recovery which reduces the recovery time the data gets saved at one central place for fast recovery which reduces the recovery time

Disadvantage of new scheme a lot of the base stations have the same DBS which means that the data will be stored on one DBS that gets overloaded sometimes. a lot of the base stations have the same DBS which means that the data will be stored on one DBS that gets overloaded sometimes.

Conclusion the recovery process in mobile databases is more complex than the recovery in traditional databases. the recovery process in mobile databases is more complex than the recovery in traditional databases. Two of the main examples on traditional schemes are the lazy and pessimistic approaches. Two of the main examples on traditional schemes are the lazy and pessimistic approaches.

Conclusion Some of the disadvantages that the traditional schemes have are high cost, large recovery time, or large data transfer. Some of the disadvantages that the traditional schemes have are high cost, large recovery time, or large data transfer. In my opinion and after the comparison, the new scheme is a better scheme. In my opinion and after the comparison, the new scheme is a better scheme. the mobile node can recover instantly in case of failure. the mobile node can recover instantly in case of failure.

Resources Ruchika Dua, Saurabh Bhandari, Recovery in Mobile Database System, International Conference on Wireless and Mobile Communications (ICWMC'06), July 2006 Ruchika Dua, Saurabh Bhandari, Recovery in Mobile Database System, International Conference on Wireless and Mobile Communications (ICWMC'06), July 2006International Conference on Wireless and Mobile Communications (ICWMC'06)International Conference on Wireless and Mobile Communications (ICWMC'06) Sashidhar Gadiraju, Vijay Kumar, Recovery in the Mobile Wireless Environment Using Mobile Agents, IEEE Transactions on Mobile Computing, April 2004 Sashidhar Gadiraju, Vijay Kumar, Recovery in the Mobile Wireless Environment Using Mobile Agents, IEEE Transactions on Mobile Computing, April 2004 IEEE Transactions on Mobile Computing, IEEE Transactions on Mobile Computing, Taesoon Park, Namyoon Woo, Heon Y. Yeom, An Efficient Recovery Scheme for Mobile Computing Environments, Eighth International Conference on Parallel and Distributed Systems (ICPADS'01), June 2001 Taesoon Park, Namyoon Woo, Heon Y. Yeom, An Efficient Recovery Scheme for Mobile Computing Environments, Eighth International Conference on Parallel and Distributed Systems (ICPADS'01), June 2001Eighth International Conference on Parallel and Distributed Systems (ICPADS'01) Eighth International Conference on Parallel and Distributed Systems (ICPADS'01) T. Park, N. Woo, H. Yeom, Efficient Recovery Information Management Schemes for the Fault Tolerant Mobile Computing Systems, 20th IEEE Symposium on Reliable Distributed Systems (SRDS'01), October 2001 T. Park, N. Woo, H. Yeom, Efficient Recovery Information Management Schemes for the Fault Tolerant Mobile Computing Systems, 20th IEEE Symposium on Reliable Distributed Systems (SRDS'01), October th IEEE Symposium on Reliable Distributed Systems (SRDS'01)20th IEEE Symposium on Reliable Distributed Systems (SRDS'01)

Questions?