Skip to main content
Log in

Localization of Integrity Constraints in Mobile Databases and Specification in PRO-MOTION

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The well-developed traditional data management techniques need to be augmented with new approaches in order to continue to be effective in the mobile environment. In this paper, we focus on the challenge of maintaining integrity constraints in the presence of disconnections and expensive communication. Our approach of localization is to reformulate global constraints so as to enhance the autonomy of the mobile hosts in processing transactions. We show how this approach unifies techniques of maintaining replicated data with methods of enforcing polynomial inequalities. We also discuss how localization can be realized in PRO-MOTION, a flexible infrastructure for transaction processing in a mobile environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. D. Barbará and H. Garcia-Molina, The demarcation protocol: A technique for maintaining linear arithmetic constraints in distributed database systems, in: Proc. 3rd Internat. Conf. on Extending Database Technology (1992) pp. 373–388.

  2. P.K. Chrysanthis, Transaction processing in a mobile computing environment, in: Proc. IEEE Workshop on Advances in Parallel and Distributed Systems (1993) pp. 77–82.

  3. P. Chrysanthis, G. Samaras and Y. Al-Houmaily, Recovery and performance of atomic commit protocols in distributed database systems, in: Recovery in Database Management Systems, eds. V. Kumar and M. Hsu (Prentice Hall, 1998).

  4. H. Garcia-Molina, Global consistency constraints considered harmful, in: Proc. 1st Internat. Workshop on Interoperability in Multidatabase Systems (1991) pp. 248–250.

  5. C.G. Gray and D. Cheriton, Leases: An efficient fault-tolerant mechanism for distributed file cache consistency, in: Proc. 12th ACM Sympos. on Operating Systems Principles (1989) pp. 202–210.

  6. B. Housel, G. Samaras and D. Lindquist, WebExpress: A client/intercept based system for optimizing web browsing in a wireless environment, Mobile Networks and Applications 3(4) (1998) 419–431.

    Google Scholar 

  7. J. Ioannidis, D. Duchamp and G.Q. Maguire, IP-based protocols for mobile internetworking, in: Proc. ACM SIGCOMM Sympos. on Communication, Architectures and Protocols (1991) pp. 235–245.

  8. J. Kisler and M. Satyanarayanan, Disconnected operation in the Coda file system, ACM Transactions on Computer Systems 10(1) (1992) 13–25.

    Google Scholar 

  9. N. Krishnakumar and A. Bernstein, High throughput Escrow algorithms for replicated databases, in: Proc. 18th Internat. Conf. on Very Large Data Bases (1992) pp. 175–186.

  10. A. Kumar and M. Stonebraker, Semantics-based transaction management techniques for replicated data, in: Proc. ACM SIGMOD Internat. Conf. on Management of Data (1988) pp. 117–125.

  11. J. Lloyd, Foundations of Logic Programming (Springer, Berlin, 1984).

    Google Scholar 

  12. S. Mazumdar, Optimizing distributed integrity constraints, in: Proc. 3rd Inernat. Sympos. on Database Systems for Advanced Applications (1993) pp. 327–334.

  13. S. Mazumdar and P. Chrysanthis, Achieving consistency in mobile databases through localization in PRO-MOTION, in: Proc. DEXA Internat. Workshop on Mobility in Databases and Distributed Systems (1999) pp. 82–89.

  14. S. Mazumdar, M. Pietrzyk and P. Chrysanthis, Caching constrained mobile data, in: Proc. 10th Internat. Conf. on Information and Knowledge Management (2001) pp. 442–449.

  15. S. Mazumdar and G. Yuan, Localizing a class of distributed constraints: A geometric approach, J. Computing and Information (2000) 3/ICCI98/6/2.

  16. S. Mazumdar and G. Yuan, Localizing global constraints: A geometric approach, in: Proc. 9th Internat. Conf. on Computing and Information (1998) pp. 297–304.

  17. P.E. O'Neil, The Escrow transactional method, ACM TODS 11(4) (1986) 405–430.

    Google Scholar 

  18. M. Pietrzyk, S. Mazumdar and R. Cline, Dynamic adjustment of localized constraints, in: Proc. 10th Internat. Conf. on Database and Expert Systems Applications (1999) pp. 791–801.

  19. E. Pitoura and G. Samaras, Data Management for Mobile Computing (Kluwer, Dordrecht, 1998).

    Google Scholar 

  20. K. Ramamritham and P. Chrysanthis, A taxonomy of correctness criteria in database applications, VLDB J. 4(1) (1996) 181–293.

    Google Scholar 

  21. L.L. Smail, Analytic Geometry and Calculus (Appleton-Century-Crofts, 1953).

  22. G.D. Walborn and P.K. Chrysanthis, Transaction processing in PROMOTION, in: Proc. 14th ACM Annual Sympos. on Applied Computing (1999) pp. 389–398.

  23. G.D. Walborn and P.K. Chrysanthis, PRO-MOTION: Support for mobile database access, J. of Personal Technologies 1(3) (1997) 171–181.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mazumdar, S., Chrysanthis, P.K. Localization of Integrity Constraints in Mobile Databases and Specification in PRO-MOTION. Mobile Networks and Applications 9, 481–490 (2004). https://doi.org/10.1023/B:MONE.0000034702.89538.a7

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:MONE.0000034702.89538.a7

Navigation