Abstract
In a mobile environment, due to the various constraints inherited from limitations of wireless communication and mobile devices, checking for integrity constraints to maintain the consistent state of mobile databases is an important issue that needs to be addressed. Hence, in this paper we propose Three-Level (3-L) model, wherein the process of constraint checking is realized at three different levels. Here, we use sufficient and complete tests together with the idea of caching relevant data items during the relocation period for checking the integrity constraints. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host. Hence, our model speeds up the checking process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hanandeh, F.A.H.: Integrity Constraints Maintenance for Parallel Databases. PhD Thesis, UPM, Malaysia (2006)
Ibrahim, H., Alwan, A.A., Udzir, N.I.: Checking Integrity Constraints with Various Types of Integrity Tests for Distributed Databases. In: Proceedings of the Eighth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT), pp. 151–152 (2007)
Ken, C.K.L., Wang-Chien, L., Sanjay, M.: Pervasive Data Access in Wireless and Mobile Computing Environments. Journal of Wireless Communications and Mobile Computing (2006)
Mazumdar, S., Chrysanthis, P.K.: Localization of Integrity Constraints in Mobile Databases and Specification in PRO-MOTION. In: Proceedings of the Mobile Networks and Applications, pp. 481–490 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ibrahim, H., Dzolkhifli, Z., Madiraju, P. (2008). Checking the Integrity Constraints of Mobile Databases with Three-Level Model. In: Gray, A., Jeffery, K., Shao, J. (eds) Sharing Data, Information and Knowledge. BNCOD 2008. Lecture Notes in Computer Science, vol 5071. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70504-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-70504-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-70503-1
Online ISBN: 978-3-540-70504-8
eBook Packages: Computer ScienceComputer Science (R0)