2015
DOI: 10.5121/ijcsa.2015.5101
|View full text |Cite
|
Sign up to set email alerts
|

Transaction Processing, Techniques In Mobile Database: An Overview

Abstract: The advancement in mobile technology and wireless network increase the using of mobile device in database driven application, these application require high reliability and availability due to nature inheritance of mobile environment, transaction is the center component in database systems, In this paper we present useful work done in mobile transaction, we show the mobile database environment and overview a lot of proposed model of mobile transaction and show many techniques used to enhance transaction execut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…However, the mobile environment has a number of shortcomings that make managing mobile data transfers difficult, such as periodic disconnections [2][3][4][5]. The primary transaction management issues stem from the versatility of the Mobile Host (MH) and the limited wireless bandwidth [6][7][8][9]. Numerous recovery modules have been created by researchers to ensure that sensitive information can be retrieved after a malfunction.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the mobile environment has a number of shortcomings that make managing mobile data transfers difficult, such as periodic disconnections [2][3][4][5]. The primary transaction management issues stem from the versatility of the Mobile Host (MH) and the limited wireless bandwidth [6][7][8][9]. Numerous recovery modules have been created by researchers to ensure that sensitive information can be retrieved after a malfunction.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the fact that the majority of nodes are mobile, the MD recovery mechanism becomes extremely difficult. Despite this, numerous parameter requirements are required for the recovery module in order to achieve a dynamic recovery protocol that adapts to changing environmental conditions [7][8][9][10]. The challenge here is determining the most appropriate recovery approach for the environmental circumstances.…”
Section: Introductionmentioning
confidence: 99%
“…Using checkpoint and message logging techniques, the mobile application may roll back to the last reliably stored state and resume execution with recovery assurances. Existing approaches operate under the assumption that MH disk storage is insecure and store checkpoint and log data at base stations [6][7][8][9]. The process for a mobile checkpoint may be coordinated or uncoordinated.…”
Section: Introductionmentioning
confidence: 99%
“…To maintain a consistent and recoverable global checkpoint, distributed applications need MHs to coordinate their local checkpoints. Because the MH can independently checkpoint its local state, uncoordinated protocols are preferred for mobile applications [7][8][9]. Recovery methods that are not coordinated are either nonlogging or logging [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…The research works [12][13][14][15][16][17][18][19][20] have discussed the characteristics of mobile transactions. Mobile transaction models have been explored but the concurrency control methods that are based on these transaction models have not been discussed.…”
mentioning
confidence: 99%