Skip to main content

Checking the Integrity Constraints of Mobile Databases with Three-Level Model

  • Conference paper
Sharing Data, Information and Knowledge (BNCOD 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5071))

Included in the following conference series:

  • 582 Accesses

Abstract

In a mobile environment, due to the various constraints inherited from limitations of wireless communication and mobile devices, checking for integrity constraints to maintain the consistent state of mobile databases is an important issue that needs to be addressed. Hence, in this paper we propose Three-Level (3-L) model, wherein the process of constraint checking is realized at three different levels. Here, we use sufficient and complete tests together with the idea of caching relevant data items during the relocation period for checking the integrity constraints. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host. Hence, our model speeds up the checking process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hanandeh, F.A.H.: Integrity Constraints Maintenance for Parallel Databases. PhD Thesis, UPM, Malaysia (2006)

    Google Scholar 

  2. Ibrahim, H., Alwan, A.A., Udzir, N.I.: Checking Integrity Constraints with Various Types of Integrity Tests for Distributed Databases. In: Proceedings of the Eighth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT), pp. 151–152 (2007)

    Google Scholar 

  3. Ken, C.K.L., Wang-Chien, L., Sanjay, M.: Pervasive Data Access in Wireless and Mobile Computing Environments. Journal of Wireless Communications and Mobile Computing (2006)

    Google Scholar 

  4. Mazumdar, S., Chrysanthis, P.K.: Localization of Integrity Constraints in Mobile Databases and Specification in PRO-MOTION. In: Proceedings of the Mobile Networks and Applications, pp. 481–490 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Alex Gray Keith Jeffery Jianhua Shao

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ibrahim, H., Dzolkhifli, Z., Madiraju, P. (2008). Checking the Integrity Constraints of Mobile Databases with Three-Level Model. In: Gray, A., Jeffery, K., Shao, J. (eds) Sharing Data, Information and Knowledge. BNCOD 2008. Lecture Notes in Computer Science, vol 5071. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70504-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-70504-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-70503-1

  • Online ISBN: 978-3-540-70504-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics