Using Separate Processing for Read-Only Transactions in Mobile Environment

  • Eddie Y. M. Chan
  • Victor C. S. Lee
  • Kwok-Wa Lam
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2574)


In mobile environment, the asymmetric communication between mobile clients and server is a distinguishing feature. The conventional query processing mechanisms cannot be directly applied. In this research, we investigate the approach of using separate processing for read-only transactions ROTs. Since ROTs have a significant proportion in several applications like traffic information service, stock market and auction, using a separate algorithm to process ROTs from update transactions may reduce the degree of data contention. Thus, both the update and read-only transactions can be executed in a more efficient manner. Besides, using separate algorithm for ROTs allows higher degree of concurrency than standard concurrency control protocols. To require a group of ROTs to be conflict serializable with respect to the update transactions, a consistency requirement called Group Strong Consistency is defined. The performance of the protocol for Group Strong Consistency was examined through a series of simulation experiments.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    S. Acharya, R. Alonso, M. Franklin and S. Zdonik, “Broadcast Disks: Data Management for Asymmetric Communications Environments”, Proceedings of the ACM SIGMOD Conference, California, pp. 199–210, May 1995.Google Scholar
  2. 2.
    S. Acharya, M. Franklin and S. Zdonik, “Disseminating Updates on Broadcast Disks”, Proceedings of 22 nd VLDB Conference, Mumbai(Bombay), India, pp. 354–365, 1996.Google Scholar
  3. 3.
    E. Pitoura, B. Bhargava, “Maintaining Consistency of Data in Mobile Distributed Environments”, Proceedings of the 15 th International Conference on Distributing Computer System, Vancouver, British Columbia, Canada, pp. 404–413, 1995.Google Scholar
  4. 4.
    E. Pitoura, “Supporting Read-Only Transactions in Wireless Broadcasting”, Proceedings of the DEXA98 International Wordshop on Mobility in Databases and Distributed Systems, pp. 428–433, 1998.Google Scholar
  5. 5.
    E. Pitoura, “Scalable Invalidation-Based Processing of Queries in Broadcast Push Delivery”, Proceedings of the Mobile Data Access Workshop, in coopeation with the 17th International Conference on Conceptual Modeling, pp. 230–241, 1999.Google Scholar
  6. 6.
    E. Pitoura, and P. K. Chrysanthis, “Scalable Processing of Read-Only Transactions in Broadcast Push,” Proceedings of the 19th IEEE International Conference on Distributed Computing System, pp. 432–439, 1999.Google Scholar
  7. 7.
    P.A. Bernstein, V. Hadzilacos, N. Goodman, “Concurrency Control and Recovery in Database Systems”, Addison-Wesley, Reading, Massachusetts.Google Scholar
  8. 8.
    D. Barbara, “Mobile Computing and Databases-A Survey”, IEEE Transactions on Knowledge and Data Engineering, Vol. 11, No. 1, pp. 108–117, 1999.CrossRefGoogle Scholar
  9. 9.
    M.S. Chen, P.S. Yu, K.L. Wu, “Indexed Sequential Data Broadcasting in Wireless Mobile Computing”, 17 th International Conference on Distributed Computing Systems, pp. 124–131, 1997.Google Scholar
  10. 10.
    D. Barbara, “Certification Reports: Supporting Transactions in Wireless Systems”, Proc. 17 th International Conference on Distributed Computing Systems, Baltimore, pp. 466–473, May 1997.Google Scholar
  11. 11.
    J. R. Haritsa, M. J. Carey, M. Livny, “Data Access Scheduling in Firm Real-time System”, Real-Time Systems, Vol. 4, No. 3, pp. 203–241, 1992.CrossRefGoogle Scholar
  12. 12.
    J. Huang, J. A. Stankovic, K. Ramamritham, D. Towley, “Experimental Evaluation of Real-Time Optimistic Concurrency Control Schemes”, Proceedings of the 17 th International Conference on Very Large Data Bases, pp. 35–46,1991.Google Scholar
  13. 13.
    M. Franklin, S. Zdonik, “Dissemination-Based Information Systems”, IEEE Data Engineering Bulletin, Vol.19, No.3, pp.: 20–30, September, 1996.Google Scholar
  14. 14.
    M. Franklin, “Concurrency Control and Recovery”, Handbook of Computer Science and Engineering, A. Tucker, ed., CRC Press, Boca Raton, 1997.Google Scholar
  15. 15.
    H. T. Kung, John T. Robinson, “On Optimistic Methods for Concurrency Control”, ACM Transactions on Database System, Vol. 6, No. 2, pp. 213–226, June 1981.CrossRefGoogle Scholar
  16. 17.
    H. Garcia-Molina, G. Wiederhold, “Read-only transactions in a distributed database”, ACM Transactions on Database Systems, Vol. 7, No. 2, pp. 209–234, June 1982.zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Eddie Y. M. Chan
    • 1
  • Victor C. S. Lee
    • 1
  • Kwok-Wa Lam
    • 1
  1. 1.Department of Computer ScienceCity University of Hong KongKowloonHong Kong

Personalised recommendations