Skip to main content
Log in

Escrow techniques for mobile sales and inventory applications

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

We address the design of architectures and protocols for providing mobile users with integrated Personal Information Services and Applications (PISA), such as personalized news and financial information, and mobile database access. We present a system architecture for delivery of PISA based on replicated distributed servers connected to users via a personal communications services (PCS) network. The PISA architecture partitions the geographical coverage area into service areas, analogous to PCS registration areas, each of which is served by a single local server. When a user moves from one service area to another, the service is provided by the new local server. This is accomplished by a service handoff, analogous to a PCS call handoff, which entails some context information transfer from the old to the new server. We focus on the mobile sales and inventory application as an example of a PISA with a well‐defined market segment. We design a database management protocol for supporting both mobile and stationary salespersons. Our design uses the site‐transaction escrow method, thus allowing faster responses to mobile clients, minimizing the amount of context information which must be transferred during a service handoff, and allowing mobile clients to operate in disconnected mode by escrowing items on their local disks. We develop a formal model for reasoning about site‐transaction escrow, and develop a scheme for performing dynamic resource reconfiguration which avoids the need for time‐consuming and costly database synchronization operations (i.e., a two‐phase commit) when the mobile sales transaction completes. A further refinement to the scheme avoids an n‐way two‐phase commit during resource reconfiguration operations, replacing it with several simpler two‐phase commits.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. G. Alonso and A. El Abbadi, Partitioned data objects in distributed databases, Technical Report TRCS-93-06, University of California, Santa Barbara (1993).

    Google Scholar 

  2. H. Balakrishnan, S. Seshan, E. Amir and R.H. Katz, Improving TCP/IP performance over wireless networks, in: Proceedings of MobiCom '95 (November 1995).

  3. D. Barbara and H. Garcia-Molina, The Demarcation Protocol: A technique for maintaining arithmetic constraints in distributed database systems, in: Proceedings of International Conference on Extending Data Base Technology (1992).

  4. P.A. Bernstein, V. Hadzilacos and N. Goodman, Concurrency Control and Recovery in Database Systems (Addison-Wesley, 1987).

  5. Cellular radiotelecommunications intersystem operations, Rev. B, EIA/TIA (July 1991).

  6. P. Chrysanthis and G. Walborn, Personal communication (1994).

  7. D.K. Gifford, Weighted voting for replicated data, in: Proceedings of the Seventh ACM Symposium on Operating Systems Principles (1979) pp. 150–159.

  8. J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques (Morgan Kaufmann, 1993).

  9. M.P. Herlihy, Concurrency vs. availability: Atomicity mechanisms for replicated data, ACM TOCS 5(3) (August 1987) 249–274.

    Article  Google Scholar 

  10. R. Jain and N. Krishnakumar, Network support for personal information services to PCS users, in: Proceedings of IEEE Conf. Networks for Personal Comm. (NPC), Long Branch, NJ (March 1994).

  11. R. Jain and N. Krishnakumar, Service handoffs and virtual mobility for delivery of personal information services to mobile users, Bellcore Technical Memorandum, TM-24696 (December 1994).

  12. R. Jain, Y.-B. Lin and S. Mohan, Location strategies for personal communications services, in: Mobile Communications Handbook, ed. J. Gibson (CRC Press, 1996).

  13. N. Krishnakumar and A. Bernstein, High throughput escrow algorithms for replicated databases, in: Proceedings of 18th Internat. Conf. on Very Large Data Bases (August 1992) pp. 175–186.

  14. A. Kumar and M. Stonebraker, Semantics based transaction management techniques for replicated data, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (1988) pp. 379–388.

  15. A.R. Modaressi and R.A. Skoog, Signaling system No. 7: A tutorial, IEEE Comm. Mag. (July 1990) 19–35.

  16. M. Mouly and M.-B. Pautet, The GSM System for Mobile Communications (49 rue Louise Bruneau, Palaiseau, France, 1992).

    Google Scholar 

  17. N.J. Muller, Wireless Data Networking (Artech House, 1995).

  18. P.E. O'Neil, The escrow transactional model, ACM Transactions on Database Systems 11(4) (December 1986) 405–430.

    Article  Google Scholar 

  19. A.R. Noerpel, L.F. Chang and D.J. Harasty, Radio link access procedure for a wireless access communications system, in: Proceedings of Internat. Conf. Comm. (May 1994).

  20. V. Schnee, An excellent adventure, Wireless (March/April 1994) 40–43.

  21. J. Schwartz, Upgrade lets salespeople share data, Comm.Week (May 24, 1994) 47–48.

    Google Scholar 

  22. N. Soparkar and A. Silberschatz, Data-value partitioning and virtual messages, in: Proceedings of 9th ACM SIGACT-SIGMOD Symposium on Principles of Database Systems (1990) pp. 357–367.

  23. R.H. Thomas, A majority consensus approach to concurrency control for multiple copy databases, ACM Transactions on Database Systems 4(2) (June 1979) 180–209.

    Article  Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Krishnakumar, N., Jain, R. Escrow techniques for mobile sales and inventory applications. Wireless Networks 3, 235–246 (1997). https://doi.org/10.1023/A:1019161318592

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1019161318592

Keywords

Navigation