Skip to main content

Design and Implementation of Pessimistic Commit Protocols in Mobile Environments

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

The Pessimistic commit protocol specifies set of rules which guarantee that every single transaction in a mobile database environment is executed to its completion or none of its operations are performed. To show the effectiveness of pessimistic commit protocols, a generic simulator is designed and implemented to demonstrate how the transactions are committed and how the data consistency is maintained when the transactions are executed concurrently. Further the constraints imposed by mobile database environments like mobility, blocking of data items etc. are effectively handled. The simulator is tested for efficiency for all timeout based strategies proposed in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Plourede, S.W.: Handling Concurrency Issues in .NET (2005), http://www.15seconds.com/issue/030604.htm (Web retreieve February 19, 2005)

  2. Basu, S., Rahman, S.M.: Improving Optimistic Concurrency Control using Hybrid Techniques of Snapshot Isolation & ROCC. In: Kumar, V., Prabhu, N., Dunham, M., Seydim, A.Y. (eds.) Proceedings of Mid-west Instruction & Computing Symposium 2006, TCOT - A Timeout based Mobile Transaction Commitment Protocol, IIS 9979453 (2004)

    Google Scholar 

  3. Nouali, N., Doucet, A., Drias, H.: A Two-Phase Commit Protocol for Mobile Wireless Environment. In: 16th Australasian Database Conference, vol. 39 (2005)

    Google Scholar 

  4. Moiz, S.A., Rajamani, L.: Single Lock Manager Approach for achieving Concurrency in Mobile Environments. In: Aluru, S., Parashar, M., Badrinath, R., Prasanna, V.K. (eds.) HiPC 2007. LNCS, vol. 4873, pp. 650–660. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Moiz, S.A., Rajamani, L.: Concurrency Control Strategy to Reduce frequent rollbacks in Mobile Environments. In: 2009 IEEE/IFIP International Symposium on Trusted Computing (TrustCom 2009), vol. 2, pp. 709–714 (2009), ISBN# 978-0-7695-3823-5

    Google Scholar 

  6. Moiz, S.A., Rajamani, L.: An Efficient Strategy for achieving Concurrency Control in Mobile Environments. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, C.-S. (eds.) APNOMS 2009. LNCS, vol. 5787, pp. 519–522. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Moiz, S.A., Rajamani, L.: An Algorithmic approach for achieving concurrency in Mobile Environments. In: 1st National Conference on Computing for Nation Development, INDIACom (2007), ISBN #978-81-094526-0-1, ISSN # 0973-7529

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abdul Moiz, S., Rajamani, L., Pal, S.N. (2010). Design and Implementation of Pessimistic Commit Protocols in Mobile Environments. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics