Strategies for Query Processing in Mobile Computing

  • Masahiko Tsukamoto
  • Rieko Kadobayashi
  • Shojiro Nishio
Part of the The Kluwer International Series in Engineering and Computer Science book series (SECS, volume 353)


In this paper, we discuss several strategies for efficient processing of three types of queries concerning mobile hosts; (1) queries to obtain the location of a mobile host (location queries), (2) queries to determine whether the mobile host is currently active (existence queries), and (3) queries to obtain a piece of information from a mobile host (data queries). Extracting five fundamental strategies from those usually employed in mobile communication protocols, we shall discuss their features and then compare their performance. These five strategies are: single broadcast notification (SBN), double broadcast notification (WBN), broadcast query forwarding (BQF), single default notification (SDN), and double default notification (WDN). We show that the optimal strategy varies according to network conditions such as network topology, network scale, migration rate, and query occurrence rate.


Data Packet Query Processing Mobile Computing Mobile Host Query Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Alonso, R. and Korth, H.F., “Database System Issues in Nomadic Computing,” Proc. of ACM-SIGMOD’93, pp.388–392, 1993.Google Scholar
  2. [2]
    Awerbuch, B. and Peleg, D., “Concurrent Online Tracking of Mobile User,” Proc. of ACM-SIGCOMM’91, pp.221–233, 1991.Google Scholar
  3. [3]
    Bar-Noy, A., Kessler, I., and Sidi, M., “Mobile Users: To Update or not to Update,” Proc. of IEEE INFOCOM’94, pp.570–576, 1994.Google Scholar
  4. [4]
    Carlberg, K.G., “A Routing Architecture That Supports Mobile End Systems,” Proc. of IEEE MILCOM’92, pp.159–164, 1992.Google Scholar
  5. [5]
    Dieplstraten, W., Ennis, G., and Belanger, P., “DFWMAC: Distributed Foundation Wireless Medium Access Control,” IEEE P802.11-93/190, 1993.Google Scholar
  6. [6]
    Forman, G.H. and Zahorjian, J., “The Challenges of Mobile Computing, IEEE COMPUTER,” Vol.27,No.4, pp.38–47, 1994.Google Scholar
  7. [7]
    Hahn, J.J. and Stolle, D.D., “Packet Radio Network Algorithms: A Survey,” IEEE Communications Magazine, Vol.22,No.11, pp.41–47, 1984.CrossRefGoogle Scholar
  8. [8]
    Ioannidis, J., Duchamp, D. and Maguire Jr., G.Q., “IP-based Protocols for Mobile Internetworking,” Proc. ACM-SIGCOMM’91, pp.235–245, 1991.Google Scholar
  9. [9]
    Imielinski, T. and Badrinath, B.R., “Querying in Highly Mobile Distributed Environments,” Proc. of VLDB’92, pp.41–52, 1992.Google Scholar
  10. [10]
    Imielinski, T. and Badrinath, B.R., “Data Management for Mobile Computing,” ACM SIGMOD RECORD, Vol.22,No.1, pp.34–39, 1993.CrossRefGoogle Scholar
  11. [11]
    Imielinski, T. and Badrinath, B.R., “Mobile Wireless Computing: Solutions and Challenges in Data Management,” Technical Report DCS-TR-296, Department of Computer Science, Rutgars University, 1993.Google Scholar
  12. [12]
    ISO 9542, “Information Processing Systems — Telecommunications and Information Exchange between Systems — End System to Intermediate System Routeing Exchange Protocol for Use in Conjunction with the Protocol for Providing the Connectionless-mode Network Service (ISO 8473),” 1988.Google Scholar
  13. [13]
    ISO/IEC 10589, “Information Technology — Telecommunications and Information Exchange between Systems — Intermediate System to Intermediate System Intra-Domain Routeing Information Exchange Protocol for Use in Conjunction with the Protocol for Providing the Connectionless-mode Network Service (ISO 8473),” 1992.Google Scholar
  14. [14]
    Korth, H.F. and Imielinski, T., “Mobile Computing: Fertile Research Area or Black Hole?,” Proc. of VLDB’93, pp.699–700, 1993.Google Scholar
  15. [15]
    Madhow, U., Honig, M.L. and Steiglitz, K., “Optimization of Wireless Resources for Personal Communications Mobility Tracking,” Proc. of IEEE INFOCOM’94, pp.577–584, 1994.Google Scholar
  16. [16]
    Moy, J., “OSPF Version 2,” RFC 1583, 1994.Google Scholar
  17. [17]
    Perkins, C.E. and Bhagwat, R., “A Mobile Networking System based on Internet Protocol,” IEEE Personal Communication, Vol.1,No.1, pp.32–41, 1994.Google Scholar
  18. [18]
    Tanaka, R. and Tsukamoto, M., “A CLNP-based Protocol for Mobile End Systems within an Area,” Proc. of IEEE International Conference on Network Protocols, pp.64–71, 1993.Google Scholar
  19. [19]
    Teraoka, F., Yokote, Y., and Tokoro, M., “A Network Architecture Providing Host Migration Transparency,” Proc. of ACM-SIGCOMM’91, pp.45–65, 1991.Google Scholar
  20. [20]
    Tsukamoto, M. and Tanaka, R., “A Routeing Protocol for Wide Area Migration using Default Address and Remaining Lifetime Parameter,” IPSJ-DPS-Report 58-3, pp. 17–24, 1992 (in Japanese).Google Scholar
  21. [21]
    Tsukamoto, M., Tanaka, R., and Tsumori, O., “Supporting ES-Migration within Areas in CLNP Networks,” IPSJ-DPS-Report 61-30, pp.227–234, 1993 (in Japanese).Google Scholar
  22. [22]
    Wada, H., Yozawa, T., Ohnishi, T., and Tanaka, Y., “Mobile Computing Environment Based on Internet Packet Forwarding,” Proc. of 1993 Winter USENIX, pp.503–517, 1993.Google Scholar
  23. [23]
    Yuan, R., “Traffic Pattern Based Mobile Routing Scheme,” Computer Communications, Vol.18,No.1, pp.32–36, 1995.CrossRefGoogle Scholar

Copyright information

© Kluwer Academic Publishers 1996

Authors and Affiliations

  • Masahiko Tsukamoto
    • 1
  • Rieko Kadobayashi
    • 2
  • Shojiro Nishio
    • 2
  1. 1.ATR Media Integration & Communications Research LaboratoriesKyotoJapan
  2. 2.Dept. of Information Systems Engineering, Faculty of EngineeringOsaka UniversitySuita, OsakaJapan

Personalised recommendations